[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 14 Dec 2024Bibliometrics
Skip Table Of Content Section
article
Located actions in process algebra with timing
Pages 183–211

We propose a process algebra obtained by adapting the process algebra with continuous relative timing from Baeten and Middelburg [Process Algebra with Timing, Springer, 2002, Chap. 4] to spatially located actions. This process algebra makes it possible ...

article
A refined VQ-based image compression method
Pages 213–221

This paper presents a refined VQ-based image compression method which modifies the traditional VQ-based image compression method. The refined VQ-based image compression method further lossless encodes the compression data which is generated by the ...

article
Consistency conditions in fuzzy consumers theory
Pages 223–245

This paper is concerned with consistency properties for fuzzy consumers. We introduce the consistency conditions <i>F</i>α, <i>F</i>β, <i>F</i>δ as fuzzy forms of Sen's properties α, β and δ. Other consistency conditions are also studied: <i>F</i>α2, <i>...

article
On the relationship between monadic and weak monadic second order logic on arbitrary trees, with applications to the mu-calculus
Pages 247–265

In 1970 [26], in Weakly definable relations and special automata, Math. Log. and Found. of Set Theory, pp 1-23, Rabin shows that a language is recognizable by a tree automaton with Büchi like infinitary condition if and only if it is definable as the ...

article
Asymptotics for length and trajectory from cumulative chord piecewise-quartics
Pages 267–283

We discuss the problem of estimating the trajectory of a regular curve γ : [0, <i>T</i>] → R<sup>n</sup> and its length <i>d</i>(γ) from an ordered sample of interpolation points <i>Q</i><inf>m</inf> = {γ(<i>t</i><inf>0</inf>), γ(<i>t</i><inf>1</inf>),...

article
C1 Interpolation with cumulative chord cubics
Pages 285–301

Cumulative chord <i>C</i><sup>1</sup> piecewise-cubics, for unparameterized data from regular curves in R<sup>n</sup>, are constructed as follows. In the first step derivatives at given ordered interpolation points are estimated from ordinary (non-<i>C</...

article
Dual LDA for face recognition
Pages 303–334

The complete theory for Fisher and dual discriminant analysis is presented as the background of the novel algorithms. LDA is found as composition of projection onto the singular subspace for within-class normalised data with the projection onto the ...

article
Fast index filtering in vector approximation file
Pages 335–349

Several fast filtering attributes are analysed for vector interval (cell) pruning while querying the vector approximation file. Beside distance range, sum and median features their deviation forms are introduced. Range and <i>K</i>-NN queries are ...

article
A method to prove non-reachability in priority duration Petri nets
Pages 351–368

Times and priorities are important concepts that are frequently used to model real-world systems. Thus, there exist extensions for Petri nets which allow to model times and priorities. In contrast, many proof techniques are based on classical (time-less ...

article
Image indexing by distributed color temperature descriptions
Pages 369–378

The paper presents new methods for image content indexing by the use of color temperature feature. A descriptor for dominant color temperature is introduced, for which two types of queries are discussed: a query by color temperature value and a query by ...

article
Scenery image segmentation using support vector machines
Pages 379–388

This paper presents an effective and efficient method for solving scenery image segmentation by applying the SVMs methodology. Scenery image segmentation is regarded as a data classification problem, and is effectively answered by the proposed method in ...

article
Enhanced of key agreement protocols resistant to a denial-of-service attack
Pages 389–398

The denial-of-service attack, a malicious client executes a key agreement protocol simultaneously many times to exhaust the server's memory or computing resource and to interfere the honest client connecting with the server. It is a serious problem in ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.