Sciweavers

107 search results - page 20 / 22
» Tactics for Hierarchical Proof
Sort
View
IESA
2007
13 years 9 months ago
UN/CEFACT Core Components as the basis for structured business communication by SMEs, employing auto-generated, user adjustable
In this paper a methodology is presented to generate webforms for business documents directly from XML schemas. XML Schemas that are based on the UN/CEFACT Naming and Design Rules ...
Fred van Blommestein, Bertjan Broeksema
PAMI
2007
193views more  PAMI 2007»
13 years 7 months ago
Robust Object Recognition with Cortex-Like Mechanisms
—We introduce a new general framework for the recognition of complex visual scenes, which is motivated by biology: We describe a hierarchical system that closely follows the orga...
Thomas Serre, Lior Wolf, Stanley M. Bileschi, Maxi...
TDSC
2010
101views more  TDSC 2010»
13 years 5 months ago
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
—This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture confines ...
Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan ...
BIRTHDAY
2010
Springer
14 years 8 days ago
The Arrow of Time through the Lens of Computing
Egon Börger Ambient Abstract State Machines with Applications 11:00 AM Manfred Broy Realizability of System Interface Specifications 11:30 AM Ofer Strichman Proving Equivalence be...
Krishna V. Palem
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
14 years 29 days ago
Characterizing Ideal Weighted Threshold Secret Sharing
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user is assigned a positive w...
Amos Beimel, Tamir Tassa, Enav Weinreb