Sciweavers

2748 search results - page 359 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
DM
2011
264views Education» more  DM 2011»
14 years 11 months ago
Connectivity threshold and recovery time in rank-based models for complex networks
The World Wide Web may be viewed as a graph each of whose vertices corresponds to a static HTML web page, and each of whose edges corresponds to a hyperlink from one web page to an...
Pawel Pralat
ICASSP
2011
IEEE
14 years 8 months ago
Error compensation and reliability based view synthesis
View synthesis offers a great flexibility in generating free viewpoint television (FTV) and 3D video (3DV). However, the depth-image-based view synthesis approach is very sensiti...
Wenxiu Sun, Oscar C. Au, Lingfeng Xu, Sung Him Chu...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 7 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
ACL
2012
13 years 6 months ago
Historical Analysis of Legal Opinions with a Sparse Mixed-Effects Latent Variable Model
We propose a latent variable model to enhance historical analysis of large corpora. This work extends prior work in topic modelling by incorporating metadata, and the interactions...
William Yang Wang, Elijah Mayfield, Suresh Naidu, ...
EMSOFT
2007
Springer
15 years 10 months ago
WCET estimation for executables in the presence of data caches
This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation...
Rathijit Sen, Y. N. Srikant