Sciweavers

3555 search results - page 190 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
FAC
2008
80views more  FAC 2008»
15 years 4 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...
CVPR
2011
IEEE
15 years 1 months ago
Learning Better Image Representations Using 'Flobject Analysis'
Unsupervised learning can be used to extract image representations that are useful for various and diverse vision tasks. After noticing that most biological vision systems for int...
Inmar Givoni, Patrick Li, Brendan Frey
169
Voted
CONIELECOMP
2011
IEEE
14 years 7 months ago
FPGA design and implementation for vertex extraction of polygonal shapes
This work focuses on developing systems of blocks in SIMULINK and VHDL to reuse on design of applications involving the recognition of polygonal objects. Usage of this work reduce...
Jorge Martínez-Carballido, Jorge Guevara-Es...
EG
2010
119views more  EG 2010»
15 years 1 months ago
Internal factors affecting the adoption and use of government websites
: The purpose of this paper is to identify internal factors within government that affect the adoption and use of government websites. A conceptual framework, based on a literature...
Brian Detlor, Maureen E. Hupfer, Umar Ruhi
ALC
1997
15 years 5 months ago
Synthesising interconnections
In the context of the modular and incremental development of complex systems, viewed as interconnections of interacting components, new dimensions and new problems arise in the ca...
José Luiz Fiadeiro, Antónia Lopes, T...