Sciweavers

333 search results - page 52 / 67
» On the complexity of partial order trace model checking
Sort
View
SPW
2004
Springer
14 years 27 days ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
CADE
2008
Springer
14 years 7 months ago
Automated Induction with Constrained Tree Automata
We propose a procedure for automated implicit inductive theorem proving for equational specifications made of rewrite rules with conditions and constraints. The constraints are int...
Adel Bouhoula, Florent Jacquemard
USAB
2008
13 years 9 months ago
How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening
The present study examines the relative importance of a series of known and expected factors that highly affect threat detection performance in aviation security X-ray screening. E...
Anton Bolfing, Tobias Halbherr, Adrian Schwaninger
SIGGRAPH
1995
ACM
13 years 11 months ago
Versatile and efficient techniques for simulating cloth and other deformable objects
We are presenting techniques for simulating the motion and the deformation of cloth, fabrics or, more generally, deformable surfaces. Our main goal is to be able to simulate any k...
Pascal Volino, Martin Courchesne, Nadia Magnenat-T...
BPSC
2009
240views Business» more  BPSC 2009»
13 years 8 months ago
Modelling and Solving Configuration Problems on Business Processes Using a Multi-Level Constraint Satisfaction Approach
Abstract: In this paper we present our ideas to apply constraint satisfaction on business processes. We propose a multi-level constraint satisfaction approach to handle t levels of...
Wolfgang Runte