Sciweavers

2835 search results - page 304 / 567
» Common Semantics for Use Cases and Task Models
Sort
View
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
15 years 10 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...
133
Voted
AAIM
2009
Springer
118views Algorithms» more  AAIM 2009»
15 years 11 months ago
A More Relaxed Model for Graph-Based Data Clustering: s-Plex Editing
We introduce the s-Plex Editing problem generalizing the well-studied Cluster Editing problem, both being NP-hard and both being motivated by graph-based data clustering. Instead o...
Jiong Guo, Christian Komusiewicz, Rolf Niedermeier...
SAT
2005
Springer
142views Hardware» more  SAT 2005»
15 years 10 months ago
Optimizations for Compiling Declarative Models into Boolean Formulas
Advances in SAT solver technology have enabled many automated analysis and reasoning tools to reduce their input problem to a SAT problem, and then to use an efficient SAT solver ...
Darko Marinov, Sarfraz Khurshid, Suhabe Bugrara, L...
UML
2000
Springer
15 years 8 months ago
Towards a UML profile for interaction design: the Wisdom approach
The UML is recognized to be the dominant diagrammatic modeling language in the software industry. However, it's support for building interactive systems is still acknowledged ...
Nuno Jardim Nunes, João Falcão e Cun...
IJCNN
2007
IEEE
15 years 10 months ago
Neurolinguistic Approach to Vector Representation of Medical Concepts
Abstract—Putative brain processes responsible for understanding language are based on spreading activation in semantic networks, providing enhanced representations that involve c...
Wlodzislaw Duch, Pawel Matykiewicz, John Pestian