Sciweavers

1414 search results - page 46 / 283
» Combining Intruder Theories
Sort
View
ICCV
1998
IEEE
14 years 2 months ago
A Theory of Catadioptric Image Formation
Conventional video cameras have limited elds of view which make them restrictive for certain applications in computational vision. A catadioptric sensor uses a combination of lens...
Simon Baker, Shree K. Nayar
DMIN
2006
151views Data Mining» more  DMIN 2006»
13 years 11 months ago
Rough Set Theory: Approach for Similarity Measure in Cluster Analysis
- Clustering of data is an important data mining application. One of the problems with traditional partitioning clustering methods is that they partition the data into hard bound n...
Shuchita Upadhyaya, Alka Arora, Rajni Jain
CONCURRENCY
2007
158views more  CONCURRENCY 2007»
13 years 10 months ago
Collective communication: theory, practice, and experience
We discuss the design and high-performance implementation of collective communications operations on distributed-memory computer architectures. Using a combination of known techni...
Ernie Chan, Marcel Heimlich, Avi Purkayastha, Robe...
LICS
2012
IEEE
12 years 9 days ago
A Higher-Order Distributed Calculus with Name Creation
—This paper introduces HOpiPn, the higher-order pi-calculus with passivation and name creation, and develops an equivalence theory for this calculus. Passivation [Schmitt and Ste...
Adrien Piérard, Eijiro Sumii
AIL
2008
103views more  AIL 2008»
13 years 10 months ago
A dialogical theory of presumption
The notions of burden of proof and presumption are central to law, but as noted in McCormick on Evidence, they are also the slipperiest of any of the family of legal terms employe...
Douglas Walton