Sciweavers

2748 search results - page 195 / 550
» Modelling Fuzzy Sets Using Object-Oriented Techniques
Sort
View
136
Voted
EUROCRYPT
2001
Springer
15 years 9 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
147
Voted
APSEC
2004
IEEE
15 years 8 months ago
An Approach to Detecting Domain Errors Using Formal Specification-Based Testing
Domain testing, a technique for testing software or portions of software dominated by numerical processing, is intended to detect domain errors that usually arise from incorrect i...
Yuting Chen, Shaoying Liu
130
Voted
BPM
2006
Springer
117views Business» more  BPM 2006»
15 years 8 months ago
Web Service E-Contract Establishment Using Features
Electronic contracts describe inter-organizational business processes in terms of supply and consumption of electronic services (commonly Web services). In a given contract domain,...
Marcelo Fantinato, Itana Maria de Souza Gimenes, M...
EMNLP
2010
15 years 3 months ago
Enhancing Mention Detection Using Projection via Aligned Corpora
The research question treated in this paper is centered on the idea of exploiting rich resources of one language to enhance the performance of a mention detection system of anothe...
Yassine Benajiba, Imed Zitouni
ICIP
2010
IEEE
15 years 2 months ago
Characterization of signal perturbation using voting based curve fitting for multispectral images
Signal degradation impacts the final quality of images acquired using remote sensing radiometer. The effectiveness of a restoration algorithm strongly depends on two main factors:...
Sebastiano Battiato, Giovanni Puglisi, Rosetta Riz...