Sciweavers

536 search results - page 34 / 108
» Deconstructing process isolation
Sort
View
CSFW
1995
IEEE
14 years 6 days ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
SIAMNUM
2010
87views more  SIAMNUM 2010»
13 years 3 months ago
A Note on the Computation of All Zeros of Simple Quaternionic Polynomials
Polynomials with quaternionic coefficients located on only one side of the powers (we call them simple polynomials) may have two different types of zeros: isolated and spherical ze...
Drahoslava Janovská, Gerhard Opfer
ICIP
2006
IEEE
14 years 10 months ago
Contour Detection by Multiresolution Surround Inhibition
In natural images, luminance changes occur both on object contours and on textures. Often, the latter are stronger than the former, thus standard edge detectors fail in isolating ...
Giuseppe Papari, Patrizio Campisi, Nicolai Petkov,...
ICPR
2008
IEEE
14 years 3 months ago
Text detection from scene images using sparse representation
A sparse representation based method is proposed for text detection from scene images. We start with edge information extracted using Canny operator and then group these edge poin...
Wumo Pan, Tien D. Bui, Ching Y. Suen
EGOV
2003
Springer
14 years 1 months ago
Local Democracy Shaping e-Democracy
This paper offers a fresh perspective to study the role and implications of information and communications technologies (ICT) in processes of local democracy. It moves away from ea...
Zahid Parvez