Sciweavers

2268 search results - page 25 / 454
» The Essence of Form Abstraction
Sort
View
BIRTHDAY
1997
Springer
14 years 4 days ago
Controlled Fuzzy Parallel Rewriting
We study a Lindenmayer-like parallel rewriting system to model the growth of filaments (arrays of cells) in which developmental errors may occur. In essence this model is the fuzz...
Peter R. J. Asveld
AMAI
2007
Springer
13 years 8 months ago
Distance semantics for database repair
Abstract In many scenarios, a database instance violates a given set of integrity constraints. In such cases, it is often required to repair the database, that is, to restore its c...
Ofer Arieli, Marc Denecker, Maurice Bruynooghe
PAA
2000
13 years 7 months ago
Using Renyi's Information and Wavelets for Target Detection: An Application to Mammograms
Abstract: In this paper we present a multi-scale method for the detection of small targets embedded in noisy background. The multiscale representation is built using a weighted und...
Giuseppe Boccignone, Angelo Chianese, Antonio Pica...
NETWORKS
2011
13 years 2 months ago
Line planning, path constrained network flow and inapproximability
Abstract. We consider a basic subproblem which arises in line planning, and is of particular importance in the context of a high system load or robustness: How much can be routed m...
Christina Büsing, Sebastian Stiller
CRYPTO
2011
Springer
222views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Computer-Aided Security Proofs for the Working Cryptographer
Abstract. We present EasyCrypt, an automated tool for elaborating security proofs of cryptographic systems from proof sketches—compact, formal representations of the essence of a...
Gilles Barthe, Benjamin Grégoire, Sylvain H...