Sciweavers

2297 search results - page 22 / 460
» An Algorithm for Computing the Integral Closure
Sort
View
WSS
2001
110views Control Systems» more  WSS 2001»
13 years 10 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
ENTCS
2007
108views more  ENTCS 2007»
13 years 8 months ago
Termination Criteria for DPO Transformations with Injective Matches
Reasoning about graph and model transformation systems is an important means to underpin model-driven software engineering, such as Model-Driven Architecture (MDA) and Model Integ...
Tihamer Levendovszky, Ulrike Prange, Hartmut Ehrig
TROB
2008
146views more  TROB 2008»
13 years 8 months ago
Mapping a Suburb With a Single Camera Using a Biologically Inspired SLAM System
This paper describes a biologically inspired approach to vision-only simultaneous localization and mapping (SLAM) on ground-based platforms. The core SLAM system, dubbed RatSLAM, i...
Michael Milford, Gordon Wyeth
CIKM
2010
Springer
13 years 7 months ago
A hierarchical approach to reachability query answering in very large graph databases
The cost of reachability query computation using traditional algorithms such as depth first search or transitive closure has been found to be prohibitive and unacceptable in mass...
Saikat K. Dey, Hasan M. Jamil