Sciweavers

979 search results - page 85 / 196
» Footprints in Local Reasoning
Sort
View
VMV
2003
123views Visualization» more  VMV 2003»
13 years 9 months ago
Using Feature Flow Fields for Topological Comparison of Vector Fields
In this paper we propose a new topology based metric for 2D vector fields. This metric is based on the concept of feature flow fields. We show that it incorporates both the cha...
Holger Theisel, Christian Rössl, Hans-Peter S...
SIGKDD
2008
159views more  SIGKDD 2008»
13 years 7 months ago
Data mining with cellular automata
A cellular automaton is a discrete, dynamical system composed of very simple, uniformly interconnected cells. Cellular automata may be seen as an extreme form of simple, localized...
Tom Fawcett
WAOA
2010
Springer
232views Algorithms» more  WAOA 2010»
13 years 5 months ago
Approximation Algorithms for Domination Search
The r-domination search game on graphs is a game-theoretical approach to several graph and hypergraph parameters including treewidth and hypertree width. The task is to identify t...
Fedor V. Fomin, Petr A. Golovach, Dimitrios M. Thi...
CADE
2007
Springer
14 years 8 months ago
A History-based Verification of Distributed Applications
Safety and security guarantees for individual applications in general depend on assumptions on the given context provided by distributed instances of operating systems, hardware pl...
Bruno Langenstein, Andreas Nonnengart, Georg Rock,...
VOTEID
2007
Springer
14 years 1 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...