Sciweavers

2757 search results - page 180 / 552
» On separating systems
Sort
View
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 8 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
137
Voted
ACE
2004
163views Education» more  ACE 2004»
15 years 6 months ago
Adventure Cycles A Software Engineering Approach
In this paper we discuss using a case study to demonstrate the software engineering process from requirements, specification, preliminary user manual, prototyping, design, impleme...
John Paynter, Emma Sharkey
TSMC
2008
119views more  TSMC 2008»
15 years 4 months ago
An Efficient Binary-Decision-Diagram-Based Approach for Network Reliability and Sensitivity Analysis
Abstract--Reliability and sensitivity analysis is a key component in the design, tuning, and maintenance of network systems. Tremendous research efforts have been expended in this ...
Liudong Xing
MODELS
2010
Springer
15 years 3 months ago
Concern-Based (de)composition of Model-Driven Software Development Processes
An MDSD process is often organised as transformation chain. This can threaten the Separation of Concerns (SoC) principle, because information is replicated in, scattered over, and ...
Jendrik Johannes, Uwe Aßmann
EMNLP
2010
15 years 2 months ago
A Fast Decoder for Joint Word Segmentation and POS-Tagging Using a Single Discriminative Model
We show that the standard beam-search algorithm can be used as an efficient decoder for the global linear model of Zhang and Clark (2008) for joint word segmentation and POS-taggi...
Yue Zhang 0004, Stephen Clark