Sciweavers

922 search results - page 182 / 185
» On a Generalization of the Stone-Weierstrass Theorem
Sort
View
FASE
2008
Springer
13 years 9 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
SODA
2008
ACM
125views Algorithms» more  SODA 2008»
13 years 8 months ago
Ultra-low-dimensional embeddings for doubling metrics
We consider the problem of embedding a metric into low-dimensional Euclidean space. The classical theorems of Bourgain, and of Johnson and Lindenstrauss say that any metric on n p...
T.-H. Hubert Chan, Anupam Gupta, Kunal Talwar
CISST
2004
181views Hardware» more  CISST 2004»
13 years 8 months ago
Intrinsic Camera Calibration Based on Radical Center Estimation
Camera calibration is an important step in obtaining 3D information from 2D images. Generally camera parameters can be obtained by using traditional methods if a calibration object...
Dong Hoon Lee, Kyung Ho Jang, Soon Ki Jung
IJCAI
1989
13 years 8 months ago
Recognizing Unnecessary Inference
Intelligent reasoners sometimes draw conclusions that lack new or relevant information. Similarly, automated reasoning systems can produce formulas that are not necessary for the ...
Dan Benanav
WOTUG
2007
13 years 8 months ago
A Process-Oriented Architecture for Complex System Modelling
Abstract. A fine-grained massively-parallel process-oriented model of platelets (potentially artificial) within a blood vessel is presented. This is a CSP inspired design, expres...
Carl G. Ritson, Peter H. Welch