Sciweavers

160 search results - page 22 / 32
» Homomorphism preservation theorems
Sort
View
TSP
2008
117views more  TSP 2008»
13 years 7 months ago
A Theory for Sampling Signals From a Union of Subspaces
One of the fundamental assumptions in traditional sampling theorems is that the signals to be sampled come from a single vector space (e.g. bandlimited functions). However, in many...
Yue M. Lu, Minh N. Do
ISBI
2004
IEEE
14 years 8 months ago
Cortical Surface Flattening Using Least Square Conformal Mapping with Minimal Metric Distortion
Although flattening a cortical surface necessarily introduces metric distortion due to the non-constant Gaussian curvature of the surface, the Riemann Mapping Theorem states that ...
Lili Ju, Josh Stern, Kelly Rehm, Kirt Schaper, Dav...
FASE
2009
Springer
14 years 2 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet
CIE
2007
Springer
14 years 1 months ago
Hierarchies in Fragments of Monadic Strict NP
We expose a strict hierarchy within monotone monadic strict NP without inequalities (MMSNP), based on the number of second-order monadic quantifiers. We do this by studying a fin...
Barnaby Martin, Florent R. Madelaine
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
14 years 21 days ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...