Sciweavers

8413 search results - page 1569 / 1683
» Ordering Problem Subgoals
Sort
View
133
Voted
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 9 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
112
Voted
ICFEM
2007
Springer
15 years 9 months ago
Model Checking with SAT-Based Characterization of ACTL Formulas
Bounded semantics of LTL with existential interpretation and that of ECTL (the existential fragment of CTL), and the characterization of these existentially interpreted properties ...
Wenhui Zhang
143
Voted
ICWE
2007
Springer
15 years 9 months ago
Metamodeling the Quality of the Web Development Process' Intermediate Artifacts
WE practices lack an impact on industry, partly due to a WE field that is not quality-aware. In fact, it is difficult to find WE methodologies that pay explicit attention to qualit...
Cristina Cachero, Coral Calero, Geert Poels
113
Voted
IWMM
2007
Springer
116views Hardware» more  IWMM 2007»
15 years 9 months ago
Heap space analysis for java bytecode
This article presents a heap space analysis for (sequential) Java bytecode. The analysis generates heap space cost relations which define at compile-time the heap consumption of ...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...
SEMWEB
2007
Springer
15 years 9 months ago
Lightweight Community-Driven Ontology Evolution
Only few well-maintained domain ontologies can be found on the Web. The likely reasons for the lack of useful domain ontologies include that (1) informal means to convey intended m...
Katharina Siorpaes
« Prev « First page 1569 / 1683 Last » Next »