Sciweavers

6147 search results - page 88 / 1230
» Requirements, Architectures and Risks
Sort
View
COMCOM
2007
83views more  COMCOM 2007»
14 years 12 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
IWANN
1997
Springer
15 years 4 months ago
The Pattern Extraction Architecture: A Connectionist Alternative to the Von Neumann Architecture
A detailed connectionist architecture is described which is capable of relating psychological behavior to the functioning of neurons and neurochemicals. The need to be able to bui...
L. Andrew Coward
ISCA
2005
IEEE
128views Hardware» more  ISCA 2005»
15 years 5 months ago
An Evaluation Framework and Instruction Set Architecture for Ion-Trap Based Quantum Micro-Architectures
: The theoretical study of quantum computation has yielded efficient algorithms for some traditionally hard problems. Correspondingly, experimental work on the underlying physical...
Steven Balensiefer, Lucas Kreger-Stickles, Mark Os...
IESA
2009
14 years 9 months ago
Model Driven Service Interoperability through Use of Semantic Annotations
This paper presents an approach for comparing two architectures for ontology-based semantic annotation for service interoperability, the EMPOWER architecture using platform specif...
Arne-Jørgen Berre, Fangning Liu, Jiucheng X...
RSKT
2007
Springer
15 years 6 months ago
Decision-Theoretic Rough Set Models
Abstract. Decision-theoretic rough set models are a probabilistic extension of the algebraic rough set model. The required parameters for defining probabilistic lower and upper ap...
Yiyu Yao