Sciweavers

1668 search results - page 156 / 334
» Two Philosophical Applications of Algorithmic Information Th...
Sort
View
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
14 years 2 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
CORR
2011
Springer
152views Education» more  CORR 2011»
13 years 3 months ago
Topology Discovery of Sparse Random Graphs With Few Participants
We consider the task of topology discovery of sparse random graphs using end-to-end random measurements (e.g., delay) between a subset of nodes, referred to as the participants. T...
Animashree Anandkumar, Avinatan Hassidim, Jonathan...
VLDB
1997
ACM
94views Database» more  VLDB 1997»
14 years 15 days ago
Describing and Using Query Capabilities of Heterogeneous Sources
Information integration systems have to cope with the different and limited query interfaces of the underlying information sources. First, the integration systems need description...
Vasilis Vassalos, Yannis Papakonstantinou
ASIAN
1998
Springer
118views Algorithms» more  ASIAN 1998»
14 years 18 days ago
Bisimulation Lattice of Chi Processes
Chi calculus was proposed as a process algebra that has a uniform treatment of names. The paper carries out a systematic study of bisimilarities for chi processes. The notion of L-...
Yuxi Fu
SEFM
2006
IEEE
14 years 2 months ago
Product Automata and Process Algebra
We define a model of labelled product systems of automata and explore its connections with process calculi and trace languages. Bisimilarity of labelled product systems is defin...
Kamal Lodaya