The issues of digital preservation of shapes and internal structures of historical and cultural objects are discussed. An overview of existing approaches to computer modeling of s...
Carl Vilbrandt, Alexander A. Pasko, Galina Pasko, ...
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
This paper introduces a new recursion principle for inductive data modulo -equivalence of bound names. It makes use of Oderskystyle local names when recursing over bound names. It...
: Middleware technologies such as CORBA and DCOM have been developed as a means of tackling heterogeneity and complexity problems inherent in distributed systems. However, more wor...
In an effort to articulate models for the intuitive representation and manipulation of 2D and 3D forms, Blum (1967, 1973) invented the notion of a skeleton. His insight was to con...
Kaleem Siddiqi, Sylvain Bouix, Allen Tannenbaum, S...