Sciweavers

476 search results - page 38 / 96
» Propagator: A Family of Patterns
Sort
View
POLICY
2004
Springer
14 years 2 months ago
Towards a Multi-dimensional Characterization of Dissemination Control
Dissemination control (DCON) is emerging as one of the most important and challenging goals for information security. DCON is concerned with controlling information and digital ob...
Roshan K. Thomas, Ravi S. Sandhu
RT
1997
Springer
14 years 25 days ago
Reconstructing the Visual Field of Compound Eyes
: Realistic image synthesis research involves the simulation of visible light propagation within an environment with a view to computing an image that evokes a similar visual respo...
Steven Collins
PRICAI
2000
Springer
14 years 8 days ago
Argumentation Semantics for Defeasible Logics
Defeasible logic is a simple but efficient rule-based non-monotonic logic. It has powerful implementations and shows promise to be applied in the areas of legal reasoning and the m...
Guido Governatori, Michael J. Maher, Grigoris Anto...
SODA
2004
ACM
98views Algorithms» more  SODA 2004»
13 years 10 months ago
End-to-end packet-scheduling in wireless ad-hoc networks
Abstract Packet-scheduling is a particular challenge in wireless networks due to interference from nearby transmissions. A distance-2 interference model serves as a useful abstract...
V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Pa...
ASC
2004
13 years 8 months ago
Efficient fuzzy compiler for SIMD architectures
Abstract. This paper presents a real-time full-programmable fuzzy compiler based on piecewise linear interpolation techniques designed to be executed in SIMD (Single Instruction Mu...
Enrique Frías-Martínez, Julio Guti&e...