Sciweavers

13 search results - page 2 / 3
» A Case study of Automatic Authoring: From a Textbook to a Hy...
Sort
View
NDSS
2000
IEEE
13 years 9 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
DICTA
2003
13 years 6 months ago
A Region-based Matching Approach for 3D-Roof Reconstruction from HR Satellite Stereo Pairs
This study is a part of a global project on urban scenes interpretation using high resolution satellite images. Actually, the research is focused on buildings and roads are used to...
Nesrine Chehata, Franck Jung, Marc Pierrot Deseill...
FTIR
2006
128views more  FTIR 2006»
13 years 5 months ago
Authorship Attribution
Authorship attribution, the science of inferring characteristics of the author from the characteristics of documents written by that author, is a problem with a long history and a...
Patrick Juola
CEC
2005
IEEE
13 years 10 months ago
A new representation in evolutionary algorithms for the optimization of bioprocesses
AbstractEvolutionary Algorithms (EAs) have been used to achieve optimal feedforward control in a number of fedbatch fermentation processes. Typically, the optimization purpose is t...
Miguel Rocha, Isabel Rocha, Eugénio C. Ferr...
WPES
2005
ACM
13 years 10 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...