Sciweavers

15253 search results - page 2832 / 3051
» Integer-Programming Software Systems
Sort
View
CCS
2008
ACM
15 years 5 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
131
Voted
CLEF
2008
Springer
15 years 5 months ago
Overview of the WikipediaMM Task at ImageCLEF 2008
The wikipediaMM task provides a testbed for the system-oriented evaluation of ad-hoc retrieval from a collection of Wikipedia images. It became a part of the ImageCLEF evaluation ...
Theodora Tsikrika, Jana Kludas
CLEF
2008
Springer
15 years 5 months ago
UniNE at Domain-Specific IR - CLEF 2008
Our first objective in participating in this domain-specific evaluation campaign is to propose and evaluate various indexing and search strategies for the German, English and Russ...
Claire Fautsch, Ljiljana Dolamic, Jacques Savoy
122
Voted
ETS
2007
IEEE
128views Hardware» more  ETS 2007»
15 years 5 months ago
Selecting Power-Optimal SBST Routines for On-Line Processor Testing
Software-Based Self-Test (SBST) has emerged as an effective strategy for on-line testing of processors integrated in non-safety critical embedded system applications. Among the mo...
Andreas Merentitis, Nektarios Kranitis, Antonis M....
CSL
2008
Springer
15 years 5 months ago
Fractional Collections with Cardinality Bounds, and Mixed Linear Arithmetic with Stars
Abstract. We present decision procedures for logical constraints involving collections such as sets, multisets, and fuzzy sets. Element membership in our collections is given by ch...
Ruzica Piskac, Viktor Kuncak
« Prev « First page 2832 / 3051 Last » Next »