Sciweavers

695 search results - page 138 / 139
» Refactoring Feature Modules
Sort
View
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 4 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
TMI
2010
96views more  TMI 2010»
13 years 4 months ago
Statistics of Optical Coherence Tomography Data From Human Retina
—Optical coherence tomography (OCT) has recently become one of the primary methods for noninvasive probing of the human retina. The pseudoimage formed by OCT (the so-called B-sca...
Norberto M. Grzywacz, Joaquín de Juan, Clau...
ACSD
2010
IEEE
251views Hardware» more  ACSD 2010»
13 years 4 months ago
Modular Interpretation of Heterogeneous Modeling Diagrams into Synchronous Equations Using Static Single Assignment
Abstract--The ANR project SPaCIFY develops a domainspecific programming environment, Synoptic, to engineer embedded software for space applications. Synoptic is an Eclipse-based mo...
Jean-Pierre Talpin, Julien Ouy, Thierry Gautier, L...
INLG
2010
Springer
13 years 3 months ago
Finding Common Ground: Towards a Surface Realisation Shared Task
In many areas of NLP reuse of utility tools such as parsers and POS taggers is now common, but this is still rare in NLG. The subfield of surface realisation has perhaps come clos...
Anja Belz, Mike White, Josef van Genabith, Deirdre...
SECON
2010
IEEE
13 years 3 months ago
iPoint: A Platform-Independent Passive Information Kiosk for Cell Phones
We introduce iPoint, a passive device that can interact and deliver information to virtually any mobile phone equipped with a WiFi network interface and a camera. The iPoint does n...
Hooman Javaheri, Guevara Noubir