Sciweavers

22698 search results - page 4264 / 4540
» Modeling in Software Engineering
Sort
View
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
16 years 1 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
CVPR
2010
IEEE
16 years 21 days ago
The Role of Features, Algorithms and Data in Visual Recognition
There are many computer vision algorithms developed for visual (scene and object) recognition. Some systems focus on involved learning algorithms, some leverage millions of trainin...
Devi Parikh and C. Lawrence Zitnick
WISTP
2010
Springer
15 years 11 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
SAC
2010
ACM
15 years 11 months ago
A deidealisation semantics for KAOS
KAOS is a goal directed requirements engineering framework based on the decomposition and refinement of goals. Decomposition and refinement continue until a point is reached at ...
Richard Banach
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
15 years 11 months ago
Fully Distributed Scrum: Replicating Local Productivity and Quality with Offshore Teams
Scrum was designed for hyperproductive teams where productivity increases by 5-10 times over industry averages and many colocated teams have achieved this effect. The question for...
Jeff Sutherland, Guido Schoonheim, Mauritz Rijk
« Prev « First page 4264 / 4540 Last » Next »