Sciweavers

2631 search results - page 319 / 527
» Less is More
Sort
View
SIGSOFT
2003
ACM
15 years 9 months ago
Evaluating and improving the automatic analysis of implicit invocation systems
Model checking and other finite-state analysis techniques have been very successful when used with hardware systems and less successful with software systems. It is especially di...
Jeremy S. Bradbury, Jürgen Dingel
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
15 years 9 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
AVBPA
2003
Springer
96views Biometrics» more  AVBPA 2003»
15 years 9 months ago
Novel Temporal Views of Moving Objects for Gait Biometrics
There is increasing interest in novel view reconstruction but less for new time-based views of moving objects as needed for gait biometric deployment. Our interests concern reconst...
Stuart P. Prismall, Mark S. Nixon, John N. Carter
ICCSA
2010
Springer
15 years 9 months ago
ISATEM: An Integration of Socioeconomic and Spatial Models for Mineral Resources Exploitation
In the spatial-integrated socioeconomic model field, a multi-agent approach is appropriate for supporting applications modelled at a detailed territory scale, but it is less used t...
Fenintsoa Andriamasinoro, Daniel Cassard, Bruno Ma...
HT
2010
ACM
15 years 9 months ago
Conversational tagging in twitter
Users on Twitter, a microblogging service, started the phenomenon of adding tags to their messages sometime around February 2008. These tags are distinct from those in other Web 2...
Jeff Huang, Katherine M. Thornton, Efthimis N. Eft...