Sciweavers

1139 search results - page 172 / 228
» Bounded Ideation Theory
Sort
View
SAS
2001
Springer
117views Formal Methods» more  SAS 2001»
14 years 6 days ago
Finite-Tree Analysis for Constraint Logic-Based Languages
Abstract. Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the omission of t...
Roberto Bagnara, Roberta Gori, Patricia M. Hill, E...
FGR
2000
IEEE
159views Biometrics» more  FGR 2000»
14 years 5 days ago
Segmenting Hands of Arbitrary Color
Colorhasbeen widelyused for handsegmentation. However, many approaches rely on predefined skin color models. It is very difficult to predefine a color model in a mobile applica...
Xiaojin Zhu, Jie Yang, Alex Waibel
CSFW
1999
IEEE
14 years 2 days ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
CADE
1998
Springer
14 years 6 hour ago
Admissibility of Fixpoint Induction over Partial Types
Partial types allow the reasoning about partial functions in type theory. The partial functions of main interest are recursively computed functions, which are commonly assigned ty...
Karl Crary
COLT
1994
Springer
13 years 12 months ago
An Optimal Parallel Algorithm for Learning DFA
: Sequential algorithms given by Angluin 1987 and Schapire 1992 learn deterministic nite automata DFA exactly from Membership and Equivalence queries. These algorithms are feasible...
José L. Balcázar, Josep Díaz,...