Sciweavers

2302 search results - page 359 / 461
» Basic Description Logics
Sort
View
148
Voted
EUROCRYPT
2005
Springer
15 years 10 months ago
Fuzzy Identity-Based Encryption
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. ...
Amit Sahai, Brent Waters
150
Voted
ICCBSS
2005
Springer
15 years 10 months ago
Specifying Interaction Constraints of Software Components for Better Understandability and Interoperability
A vital issue in the correct use of commercial-off-the-shelf (COTS) components is the proper understanding of their functionality, quality attributes and ways of operation. Traditi...
Yan Jin, Jun Han
148
Voted
IJCNLP
2005
Springer
15 years 10 months ago
Automatic Image Annotation Using Maximum Entropy Model
Automatic image annotation is a newly developed and promising technique to provide semantic image retrieval via text descriptions. It concerns a process of automatically labeling t...
Wei Li, Maosong Sun
143
Voted
ACMMSP
2004
ACM
125views Hardware» more  ACMMSP 2004»
15 years 10 months ago
Improving trace cache hit rates using the sliding window fill mechanism and fill select table
As superscalar processors become increasingly wide, it is inevitable that the large set of instructions to be fetched every cycle will span multiple noncontiguous basic blocks. Th...
Muhammad Shaaban, Edward Mulrane
RE
2004
Springer
15 years 10 months ago
Fluent-Based Animation: Exploiting the Relation between Goals and Scenarios for Requirements Validation
Scenarios and goals are effective and popular techniques for requirements definition. Validation is essential in order to ensure that they represent what stakeholders actually wan...
Sebastián Uchitel, Robert Chatley, Jeff Kra...