Sciweavers

2455 search results - page 100 / 491
» Learning Composite Concepts
Sort
View
GPCE
2009
Springer
15 years 9 months ago
Safe composition of non-monotonic features
Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
Martin Kuhlemann, Don S. Batory, Christian Kä...
149
Voted
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
15 years 8 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
159
Voted
CIIA
2009
15 years 6 months ago
Web Services Composition Applying MDA
Currently, Web services are available on Internet in a simple and easy way to use. However, a single service can not respond to a predetermined request by user. Thus, it is necessa...
Yamina Hachemi, Mimoun Malki, Djamel Amar Bensaber
GI
2010
Springer
15 years 3 months ago
Finite System Composition and Interaction
: In this article, it is proven for finite systems that if by reciprocal interaction, one finite system determines the action of another finite system, then both systems become sub...
Johannes Reich
ICMCS
2007
IEEE
155views Multimedia» more  ICMCS 2007»
15 years 11 months ago
Hidden Maximum Entropy Approach for Visual Concept Modeling
Recently, the bag-of-words approach has been successfully applied to automatic image annotation, object recognition, etc. The method needs to first quantize an image using the vis...
Sheng Gao, Joo-Hwee Lim, Qibin Sun