Sciweavers

1469 search results - page 84 / 294
» Map operations and k-orbit maps
Sort
View
ICSOC
2009
Springer
14 years 4 months ago
An Automatic Approach to Enable Replacement of Conversational Services
Abstract. In Service Oriented Architectures (SOAs) services invoked in a composition can be replaced by other services, which are possibly discovered and bound at runtime. Most of ...
Luca Cavallaro, Elisabetta Di Nitto, Matteo Pradel...
BVAI
2005
Springer
14 years 3 months ago
Multi-scale Keypoints in V1 and Face Detection
Abstract. End-stopped cells in cortical area V1, which combine outputs of complex cells tuned to different orientations, serve to detect line and edge crossings (junctions) and po...
João Rodrigues, J. M. Hans du Buf
FSE
2005
Springer
106views Cryptology» more  FSE 2005»
14 years 3 months ago
New Applications of T-Functions in Block Ciphers and Hash Functions
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All ...
Alexander Klimov, Adi Shamir
PADL
1999
Springer
14 years 2 months ago
MCORBA: A CORBA Binding for Mercury
MCORBA is a binding to the CORBA distributed object framework for the purely declarative logic/functional language Mercury. The binding preserves the referential transparency of th...
David Jeffery, Tyson Dowd, Zoltan Somogyi
USENIX
2000
13 years 11 months ago
Location-Aware Scheduling with Minimal Infrastructure
Mobile computers often benefit from software which adapts to their location. For example, a computer might be backed up when at the office, or the default printer might always be ...
John S. Heidemann, Dhaval Shah