Sciweavers

306 search results - page 35 / 62
» Underspecified computation of normal forms
Sort
View
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
WACV
2005
IEEE
14 years 1 months ago
Patchlets: Representing Stereo Vision Data with Surface Elements
This paper describes a class of augmented surface elements which we call patchlets. Patchlets are planar surface elements generated from dense stereo vision 3D range images. Patch...
Don Murray, James J. Little
LICS
2008
IEEE
14 years 2 months ago
On the Expressiveness and Decidability of Higher-Order Process Calculi
In higher-order process calculi the values exchanged in communications may contain processes. A core calculus of higher-order concurrency is studied; it has only the operators nec...
Ivan Lanese, Jorge A. Pérez, Davide Sangior...
LICS
2008
IEEE
14 years 2 months ago
An Algebraic Process Calculus
We present an extension of the πI-calculus with formal sums of terms. The study of the properties of this sum reveals that its neutral element can be used to make assumptions abo...
Emmanuel Beffara
RTCSA
2006
IEEE
14 years 1 months ago
Characterization and Analysis of Tasks with Offsets: Monotonic Transactions
This article introduces the concept of monotonic transactions. A monotonic transaction is a particular case of transactions for which the load arrival pattern is (or can be by rot...
Karim Traore, Emmanuel Grolleau, Francis Cottet