Sciweavers

4140 search results - page 26 / 828
» A Use Case Based Approach to Feature Models' Construction
Sort
View
CEAS
2008
Springer
15 years 1 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
STEP
2003
IEEE
15 years 5 months ago
On Analysis of Design Component Contracts: A Case Study
Software patterns are a new design paradigm used to solve problems that arise when developing software within a particular context. Patterns capture the static and dynamic structu...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
EMMCVPR
2009
Springer
15 years 6 months ago
Clustering-Based Construction of Hidden Markov Models for Generative Kernels
Generative kernels represent theoretically grounded tools able to increase the capabilities of generative classification through a discriminative setting. Fisher Kernel is the fi...
Manuele Bicego, Marco Cristani, Vittorio Murino, E...
MKWI
2008
108views Business» more  MKWI 2008»
15 years 1 months ago
Empirical-Based Construction of Reference Models in Public Administrations
: This paper introduces a tailored procedure model to construct reference models by using rich empirical data. The procedure model has been built based on requirements from the pub...
Milan Karow, Daniel Pfeiffer, Michael Räckers
IACR
2011
125views more  IACR 2011»
13 years 11 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...