Sciweavers

127 search results - page 14 / 26
» On the Foundations of Computing Deltas Between RDF Models
Sort
View
CGI
2006
IEEE
14 years 2 months ago
A Feature-Preserving and Volume-Constrained Flow for Fairing Irregular Meshes
In this paper, we introduce a novel approach to denoise meshes taking the balanced flow equation as the theoretical foundation.The underlying model consists of an anisotropic diï¬...
Chunxia Xiao, Shu Liu, Qunsheng Peng, A. Robin For...
GLOBECOM
2008
IEEE
14 years 2 months ago
An Upper Bound on Network Size in Mobile Ad-Hoc Networks
—In this paper we propose a model to compute an upper bound for the maximum network size in mobile ad-hoc networks. Our model is based on the foundation that for a unicast route ...
Michael Pascoe, Javier Gomez, Victor Rangel, Migue...
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 2 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
EDOC
2004
IEEE
13 years 11 months ago
A Logical Viewpoint on Architectures
In this paper we introduce a logical viewpoint on architectures. The logical viewpoint is based on the distinction between symbolic and semantic models of architectures. The core ...
Frank S. de Boer, Marcello M. Bonsangue, Joost Jac...
ICCS
2005
Springer
14 years 1 months ago
Morphisms in Context
Abstract. Morphisms constitute a general tool for modelling complex relationships between mathematical objects in a disciplined fashion. In Formal Concept Analysis (FCA), morphisms...
Markus Krötzsch, Pascal Hitzler, Guo-Qiang Zh...