Sciweavers

608 search results - page 105 / 122
» Tests, Proofs and Refinements
Sort
View
ENTCS
2006
112views more  ENTCS 2006»
13 years 7 months ago
Modeling Web Applications by the Multiple Levels of Integrity Policy
We propose a formal method to validate the reliability of a web application, by modeling interactions among its constituent objects. Modeling exploits the recent "Multiple Le...
Gianluca Amato, Massimo Coppola, Stefania Gnesi, F...
SIAMSC
2008
127views more  SIAMSC 2008»
13 years 7 months ago
Restoration of Chopped and Nodded Images by Framelets
In infrared astronomy, an observed image from a chop and nod process can be considered as the result of passing the original image through a highpass filter. Here we propose a rest...
Jian-Feng Cai, Raymond H. Chan, Lixin Shen, Zuowei...
RAS
2006
100views more  RAS 2006»
13 years 7 months ago
Aibo and Webots: Simulation, wireless remote control and controller transfer
This article introduces a new software tool that provides an accurate simulation of Sony Aibo robots and the capability to transfer controller programs from the simulation to the ...
Lukas Hohl, Ricardo A. Téllez, Olivier Mich...
IJON
2007
88views more  IJON 2007»
13 years 7 months ago
Self-organisation can generate the discontinuities in the somatosensory map
The primary somatosensory cortex contains a topographic map of the body surface, with two notable discontinuities — the representation of the face is next to that of the hands, ...
Tom Stafford, Stuart P. Wilson
TCS
2008
13 years 7 months ago
Expanders and time-restricted branching programs
The replication number of a branching program is the minimum number R such that along every accepting computation at most R variables are tested more than once; the sets of variab...
Stasys Jukna