Sciweavers

886 search results - page 76 / 178
» Experiences Using Lightweight Formal Methods for Requirement...
Sort
View
ESORICS
2005
Springer
15 years 3 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
ICMCS
2008
IEEE
120views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Using Semantic Graphs for Image Search
In this paper, we propose a Semantic Graphs for Image Search (SGIS) system, which provides a novel way for image search by utilizing collaborative knowledge in Wikipedia and netwo...
Jyh-Ren Shieh, Yang-Ting Yeh, Chih-Hung Lin, Ching...
WSC
1998
14 years 11 months ago
MODSIM III - a Tutorial with Advances in Database Access and HLA Support
MODSIM II is an object-oriented discrete event simulation language featuring extensive run-time libraries, graphical user interface and results presentation tools, database access...
John Goble, Brian Wood
ACL
2003
14 years 11 months ago
A Syllable Based Word Recognition Model for Korean Noun Extraction
Noun extraction is very important for many NLP applications such as information retrieval, automatic text classification, and information extraction. Most of the previous Korean ...
Do-Gil Lee, Hae-Chang Rim, Heui-Seok Lim
JODS
2006
148views Data Mining» more  JODS 2006»
14 years 10 months ago
Discovering the Semantics of Relational Tables Through Mappings
Abstract. Many problems in Information and Data Management require a semantic account of a database schema. At its best, such an account consists of formulas expressing the relatio...
Yuan An, Alexander Borgida, John Mylopoulos