Sciweavers

2351 search results - page 426 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
JDCTA
2010
187views more  JDCTA 2010»
14 years 4 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
TSP
2010
14 years 4 months ago
Noninvertible gabor transforms
Abstract--Time-frequency analysis, such as the Gabor transform, plays an important role in many signal processing applications. The redundancy of such representations is often dire...
Ewa Matusiak, Tomer Michaeli, Yonina C. Eldar
JAMIA
2011
98views more  JAMIA 2011»
14 years 20 days ago
Mapping clinical phenotype data elements to standardized metadata repositories and controlled terminologies: the eMERGE Network
Background Systematic study of clinical phenotypes is important for a better understanding of the genetic basis of human diseases and more effective gene-based disease management....
Jyotishman Pathak, Janey Wang, Sudha Kashyap, Meli...
SIGECOM
2011
ACM
203views ECommerce» more  SIGECOM 2011»
14 years 18 days ago
Polynomial-time computation of exact correlated equilibrium in compact games
In a landmark paper, Papadimitriou and Roughgarden [2008] described a polynomial-time algorithm (“Ellipsoid Against Hope”) for computing sample correlated equilibria of concis...
Albert Xin Jiang, Kevin Leyton-Brown
EDM
2011
197views Data Mining» more  EDM 2011»
13 years 9 months ago
Towards Improvements on Domain-independent Measurements for Collaborative Assessment
Assessment on collaborative student behavior is a longstanding issue in user modeling. Nowadays thanks to the proliferation of online learning and the vast amount of data on studen...
Antonio R. Anaya, Jesus Boticario