Sciweavers

6258 search results - page 67 / 1252
» Applied Text Generation
Sort
View
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 4 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
SBACPAD
2003
IEEE
125views Hardware» more  SBACPAD 2003»
15 years 3 months ago
Applying Scheduling by Edge Reversal to Constraint Partitioning
— Scheduling by Edge Reversal (SER) is a fully distributed scheduling mechanism based on the manipulation of acyclic orientations of a graph. This work uses SER to perform constr...
Marluce Rodrigues Pereira, Patrícia Kayser ...
FUZZIEEE
2007
IEEE
15 years 1 months ago
Genetic Fuzzy Systems applied to Online Job Scheduling
Abstract-- This paper presents a comparison of three different design concepts for Genetic Fuzzy systems. We apply a Symbiotic Evolution that uses the Michigan approach and two app...
Carsten Franke, Joachim Lepping, Uwe Schwiegelshoh...
SAC
2006
ACM
15 years 3 months ago
Lost in just the translation
This paper describes the design and implementation of a scheme for hiding information in translated natural language text, and presents experimental results using the implemented ...
Ryan Stutsman, Christian Grothoff, Mikhail J. Atal...
ILP
2007
Springer
15 years 4 months ago
Applying Inductive Logic Programming to Process Mining
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Serg...