Sciweavers

2055 search results - page 238 / 411
» Generic Model Refactorings
Sort
View
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 9 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
ELPUB
2006
ACM
15 years 9 months ago
Encoding and Querying Multi-Structured Documents
This paper concerns the document multi-structuring issue. For various use objectives, many distinct structures may be defined simultaneously for the same original document. For ex...
Noureddine Chatti, Sylvie Calabretto, Jean-Marie P...
BPM
2005
Springer
99views Business» more  BPM 2005»
15 years 8 months ago
On Automating Networked Enterprise Management
With the new middleware IT technologies such as Web Services and peer-to-peer computing facilities, a Virtual Enterprise can be built easier achieving some problems of interoperabi...
Ustun Yildiz, Olivier Perrin, Claude Godart
133
Voted
IPMI
2005
Springer
15 years 8 months ago
A Generalized Level Set Formulation of the Mumford-Shah Functional for Brain MR Image Segmentation
Brain MR image segmentation is an important research topic in medical image analysis area. In this paper, we propose an active contour model for brain MR image segmentation, based ...
Lishui Cheng, Jie Yang, Xian Fan, Yuemin Zhu
CP
2004
Springer
15 years 8 months ago
Constraint-Based Combinators for Local Search
Abstract. One of the most appealing features of constraint programming is its rich constraint language for expressing combinatorial optimization problems. This paper demonstrates t...
Pascal Van Hentenryck, Laurent Michel, Liyuan Liu