Sciweavers

8701 search results - page 1732 / 1741
» XML-Based Feature Modelling
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 7 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
LOGCOM
2000
63views more  LOGCOM 2000»
13 years 7 months ago
Reflection principles in computational logic
We introduce the concept of reflection principle as a knowledge representation paradigm in a computational logic setting. Reflection principles are expressed as certain kinds of l...
Jonas Barklund, Pierangelo Dell'Acqua, Stefania Co...
IJCV
2002
188views more  IJCV 2002»
13 years 7 months ago
Scalable Extrinsic Calibration of Omni-Directional Image Networks
We describe a linear-time algorithm that recovers absolute camera orientations and positions, along with uncertainty estimates, for networks of terrestrial image nodes spanning hun...
Matthew E. Antone, Seth J. Teller
CORR
1998
Springer
110views Education» more  CORR 1998»
13 years 7 months ago
Ultrametric Distance in Syntax
Phrase structure trees have a hierarchical structure. In many subjects, most notably in taxonomy such tree structures have been studied using ultrametrics. Here syntactical hierar...
Mark D. Roberts
ALGORITHMICA
1999
156views more  ALGORITHMICA 1999»
13 years 7 months ago
Competitive Optimal On-Line Leasing
Consider an on-line player who needs some equipment (e.g., a computer) for an initially unknown number of periods. At the start of each period it is determined whether the player w...
Ran El-Yaniv, R. Kaniel, Nathan Linial
« Prev « First page 1732 / 1741 Last » Next »