Sciweavers

4340 search results - page 789 / 868
» Formal Methods and Cryptography
Sort
View
WOTE
2010
15 years 2 months ago
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
Abstract. While electronic elections promise the possibility of convenient, efficient and secure facilities for recording and tallying votes, recent studies have highlighted inadeq...
Stéphanie Delaune, Steve Kremer, Mark Ryan
ACL
2009
15 years 2 months ago
A Novel Discourse Parser Based on Support Vector Machine Classification
This paper introduces a new algorithm to parse discourse within the framework of Rhetorical Structure Theory (RST). Our method is based on recent advances in the field of statisti...
David duVerle, Helmut Prendinger
CLUSTER
2009
IEEE
15 years 2 months ago
MITHRA: Multiple data independent tasks on a heterogeneous resource architecture
With the advent of high-performance COTS clusters, there is a need for a simple, scalable and faulttolerant parallel programming and execution paradigm. In this paper, we show that...
Reza Farivar, Abhishek Verma, Ellick Chan, Roy H. ...
GI
2009
Springer
15 years 2 months ago
Modelling Missing Values for Audience Measurement in Outdoor Advertising Using GPS Data
Abstract: GPS technology has made it possible to evaluate the performance of outdoor advertising campaigns in an objective manner. Given the GPS trajectories of a sample of test pe...
Michael May, Christine Körner, Dirk Hecker, M...
CLEIEJ
2010
15 years 1 months ago
Empirical Validation of Component-based Software Systems Generation and Evaluation Approaches
Component-based software development needs to formalize a process of generation, evaluation and selection of Composite COTS-based Software Systems (CCSS), enabling software archit...
Victor Sagredo, Carlos Becerra, Gonzalo Valdes