Sciweavers

9425 search results - page 1610 / 1885
» Some Notes on Models and Modelling
Sort
View
JSW
2008
104views more  JSW 2008»
15 years 4 months ago
Testing Software Assets of Framework-Based Product Families During Application Engineering Stage
An application framework provides reusable design and implementation for a family of software systems. At the application engineering stage, application developers extend framework...
Jehad Al-Dallal, Paul G. Sorenson
JSW
2008
98views more  JSW 2008»
15 years 4 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
JSYML
2008
72views more  JSYML 2008»
15 years 4 months ago
Perfect trees and elementary embeddings
An important technique in large cardinal set theory is that of extending an elementary embedding j : M N between inner models to an elementary embedding j : M[G] N[G] between ge...
Sy-David Friedman, Katherine Thompson
JUCS
2008
180views more  JUCS 2008»
15 years 4 months ago
A Novel Multi-Layer Level Set Method for Image Segmentation
: In this paper, a new multi-layer level set method is proposed for multi-phase image segmentation. The proposed method is based on the conception of image layer and improved numer...
Xiaofeng Wang, De-Shuang Huang
ECCC
2007
123views more  ECCC 2007»
15 years 4 months ago
Lossy Trapdoor Functions and Their Applications
We propose a general cryptographic primitive called lossy trapdoor functions (lossy TDFs), and use it to develop new approaches for constructing several important cryptographic to...
Chris Peikert, Brent Waters
« Prev « First page 1610 / 1885 Last » Next »