Sciweavers

3038 search results - page 381 / 608
» Issues in Multiagent System Development
Sort
View
CVPR
1997
IEEE
15 years 8 months ago
The FERET Evaluation Methodology for Face-Recognition Algorithms
Two of the most critical requirementsin support of producing reliableface-recognition systems are a large database of facial images and a testing procedure to evaluate systems. Th...
P. Jonathon Phillips, Hyeonjoon Moon, Patrick J. R...
OOIS
1997
Springer
15 years 8 months ago
Object-Oriented Design of a Database Engine for Multidimensional Discrete Data
Multidimensional discrete data (MDD), i.e. arrays of arbitrary size, dimension and base type, occur in a variety of application elds. The object-oriented DBMS RasDaMan2 provides d...
Paula Furtado, Roland Ritsch, Norbert Widmann, Pet...
SRDS
1993
IEEE
15 years 8 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
CC
1994
Springer
107views System Software» more  CC 1994»
15 years 8 months ago
Solving Demand Versions of Interprocedural Analysis Problems
This paper concerns the solution of demand versions of interprocedural analysis problems. In a demand version of a program-analysis problem, some piece of summary information (e.g...
Thomas W. Reps
ICECCS
2007
IEEE
111views Hardware» more  ICECCS 2007»
15 years 8 months ago
A Refinement Driven Component-Based Design
Modern software applications ranging from enterprise to embedded systems are becoming increasingly complex, and require very high levels of dependability assurance. The most effec...
Zhenbang Chen, Zhiming Liu, Volker Stolz, Lu Yang,...