Sciweavers

1828 search results - page 235 / 366
» From Features to Semantics: Some Preliminary Results
Sort
View
ASWC
2006
Springer
15 years 1 months ago
Web Services Analysis: Making Use of Web Service Composition and Annotation
Automated Web service composition and automated Web service annotation could be seen as complimentary methodologies. While automated annotation allows to extract Web service semant...
Peep Küngas, Mihhail Matskin
IACR
2011
94views more  IACR 2011»
13 years 9 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
SAC
2010
ACM
15 years 5 months ago
Hypothesis generation and ranking based on event similarities
Accelerated by the technological advances in the domain, the size of the biomedical literature has been growing rapidly. As a result, it is not feasible for individual researchers...
Taiki Miyanishi, Kazuhiro Seki, Kuniaki Uehara
CIE
2009
Springer
15 years 4 months ago
First-Order Universality for Real Programs
J. Raymundo Marcial–Romero and M. H. Escard´o described onal programming language with an abstract data type Real for the real numbers and a non-deterministic operator rtest: Re...
Thomas Anberrée
ACSD
2007
IEEE
67views Hardware» more  ACSD 2007»
15 years 4 months ago
Hazard Checking of Timed Asynchronous Circuits Revisited
This paper proposes a new approach for the hazard checking of timed asynchronous circuits. Previous papers proposed either exact algorithms, which suffer from statespace explosion...
Frédéric Béal, Tomohiro Yoned...