In this paper, we propose a visual hull algorithm, which guarantees a correct construction even in the presence of partial occlusion, while “correct” here means that the real ...
— This paper reports on an experiment in network protocol design: we use novel rigorous techniques in the design process of a new protocol, in a close collaboration between syste...
Adam Biltcliffe, Michael Dales, Sam Jansen, Tom Ri...
— We consider the regression problem for financial time series. Typically, financial time series are non-stationary and volatile in nature. Because of its good generalization p...
Kaizhu Huang, Haiqin Yang, Irwin King, Michael R. ...
The semantics of process calculi has traditionally been specified by labelled transition systems (LTS), but with the development of name calculi it turned out that reaction rules...
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...