Sciweavers

10602 search results - page 44 / 2121
» Weakly Useful Sequences
Sort
View
ICTAC
2004
Springer
14 years 2 months ago
A Proof of Weak Termination Providing the Right Way to Terminate
We give an inductive method for proving weak innermost termination of rule-based programs, from which we automatically infer, for each successful proof, a finite strategy for data...
Olivier Fissore, Isabelle Gnaedig, Hél&egra...
ICDCS
1995
IEEE
14 years 21 days ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
TLCA
2007
Springer
14 years 3 months ago
Weakly Distributive Domains
In our previous work [17] we have shown that for any ω-algebraic meet-cpo D, if all higher-order stable function spaces built from D are ω-algebraic, then D is finitary. This ac...
Ying Jiang, Guo-Qiang Zhang
CAD
2004
Springer
13 years 9 months ago
Linear one-sided stability of MAT for weakly injective 3D domain
Despite its usefulness in many applications, the medial axis transform (MAT) is very sensitive to the change of the boundary in the sense that, even if a shape is perturbed only s...
Sung Woo Choi, Hans-Peter Seidel
JCST
2008
120views more  JCST 2008»
13 years 9 months ago
Generic Transformation from Weakly to Strongly Unforgeable Signatures
Current techniques for transforming unforgeable signature schemes (the forged message has never been signed) to strongly unforgeable ones (the forged message could have been signed...
Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao