Sciweavers

680 search results - page 33 / 136
» Complexity of Strict Implication
Sort
View
JSAC
2006
157views more  JSAC 2006»
13 years 7 months ago
Traffic grooming in path, star, and tree networks: complexity, bounds, and algorithms
We consider the problem of traffic grooming in WDM path, star, and tree networks. Traffic grooming is a variant of the well-known logical topology design, and is concerned with the...
Shu Huang, Rudra Dutta, George N. Rouskas
BMCBI
2005
61views more  BMCBI 2005»
13 years 7 months ago
Proteins with two SUMO-like domains in chromatin-associated complexes: The RENi (Rad60-Esc2-NIP45) family
Background: Post-translational modification by Small Ubiquitin-like Modifiers (SUMO) has been implicated in protein targeting, in the maintenance of genomic integrity and in trans...
Maria Novatchkova, Andreas Bachmair, Birgit Eisenh...
SEBD
2001
145views Database» more  SEBD 2001»
13 years 9 months ago
Reasoning over Conceptual Schemas and Queries in Temporal Databases
This paper introduces a new logical formalism, intended for temporal conceptual modelling, as a natural combination of the well-known description logic DLR and point-based linear ...
Alessandro Artale, Enrico Franconi, Milenko Mosuro...
CVPR
2007
IEEE
14 years 9 months ago
Symmetric Objects are Hardly Ambiguous
Given any two images taken under different illumination conditions, there always exist a physically realizable object which is consistent with both the images even if the lighting...
Gaurav Aggarwal, Soma Biswas, Rama Chellappa
ICCS
2009
Springer
14 years 2 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel