Sciweavers

1229 search results - page 162 / 246
» A New Method for Dependent Parsing
Sort
View
TKDE
2008
116views more  TKDE 2008»
14 years 9 months ago
Long-Term Cross-Session Relevance Feedback Using Virtual Features
Relevance feedback (RF) is an iterative process, which refines the retrievals by utilizing the user's feedback on previously retrieved results. Traditional RF techniques solel...
Peng-Yeng Yin, Bir Bhanu, Kuang-Cheng Chang, Anlei...
CERA
2004
89views more  CERA 2004»
14 years 9 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
ICCAD
2009
IEEE
119views Hardware» more  ICCAD 2009»
14 years 7 months ago
Iterative layering: Optimizing arithmetic circuits by structuring the information flow
Current logic synthesis techniques are ineffective for arithmetic circuits. They perform poorly for XOR-dominated circuits, and those with a high fan-in dependency between inputs ...
Ajay K. Verma, Philip Brisk, Paolo Ienne
ICSE
2005
IEEE-ACM
15 years 10 months ago
Verifying safety policies with size properties and alias controls
Many software properties can be analysed through a relational size analysis on each function's inputs and outputs. Such relational analysis (through a form of dependent typin...
Wei-Ngan Chin, Siau-Cheng Khoo, Shengchao Qin, Cor...
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin