نتایج جستجو برای: trace constraint

تعداد نتایج: 144250  

2014
David Baelde Stéphanie Delaune Lucca Hirschi

Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e., without replication) by means of symbolic execution and constraint solving. However, this does not suffice to obtain practical tools. Current prototypes suffer ...

2011
Quan Pham Jason Reid Ed Dawson

The paper addresses the issue of providing access control via delegation and constraint management across multiple security domains. Specifically, this paper proposes a novel Delegation Constraint Management model to manage and enforce delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a del...

Journal: :Minerals 2023

Recently, multi-trace impedance inversion has attracted great interest in seismic exploration because it improves the horizontal continuity and fidelity of results by exploiting lateral structure information strata. However, computational inefficiency affects its practical application. Furthermore, terms vertical constraints on model parameters, only considers smooth features while ignoring sha...

Journal: :J. Log. Program. 1999
Mireille Ducassé

Traces of program executions are a helpful source of information for program debugging. They, however, give a picture of program executions at such a low level that users often have diiculties to interpret the information. Opium, our extendable trace analyzer, is connected to a \standard" Prolog tracer. Opium is programmable and extendable. It provides a trace query language and abstract views ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

هدف این مطالعه تعیین کردن این مساله است که آیا فراگیران فارسی زبان قادر به تطبیق پارامتری ضمیر موصولی that در جملات ساده و پیچیده ی انگلیسی در سایه اصل دستور جهانی هستند یا خیر. به علاوه نقش جنسیت در رابطه با آزمون تشخیص درستی یا نادرستی جملات دستوری مورد بررسی قرار گرفت. داده ها از 54 دانشجوی فراگیر زبان انگلیسی در دانشگاه فردوسی مشهد گردآوری شد. شرکت کنندگان در آزمون شامل 28 زن (51.85 درصد)و ...

2004
W. HEHL ERIC A. LORD

We continue our investigation of a variational principle for general relativity in which the metric tensor and the (asymmetric) linear connection are varied independently. As in Part I, the matter Lagrangian is minimally coupled to the connection and the gravitational Lagrangian is taken to be the curvature scalar, but we now relax the Riemannian constraint as far as possible-that is, as far as...

1995
Mireille Ducassé

Traces of program executions tell how programs behave in given cases. They are a helpful source of information for automated debugging. Opium is an automated trace analyser for Prolog programs. It is programmable and extendable. It provides a trace query language and abstract views of executions as a basis for automated debugging. Opium has shown its capabilities to build abstract tracers and a...

2014
Clemens Ballarin

Roşu and Chen’s trace analysis algorithm identifies activity streams in a monitored application based on data (such as memory locations) and groups events accordingly into slices. It can be generalised to assign several such activity streams to the same slice, even if data is unrelated. This is useful for monitoring scheduling algorithms, which linearise activity streams that are not necessaril...

Journal: :IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics : a publication of the IEEE Systems, Man, and Cybernetics Society 1999
Krishnendu Chaudhury Rajiv Mehrotra C. Srinivasan

An algorithm for computing three-dimensional (3-D) velocity field and motion parameters from a range image sequence is presented. It is based on a new integral 3-D rigid motion invariant feature-the trace of a 3x3 "feature matrix" related to the moment of inertia tensor. This trace can be computed at every point of a moving surface and provides a quantitative measure of the local shape of the s...

2012
Abhishek Dutta Raymond Veldhuis Luuk Spreeuwers Didier Meuwly

Recently, it has been shown that performance of a face recognition system depends on the quality of both face images participating in the recognition process: the reference and the test image. In the context of forensic face recognition, this observation has two implications: a) the quality of the trace (extracted from CCTV footage) constrains the performance achievable using a particular face ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید