Sciweavers

7434 search results - page 41 / 1487
» Still
Sort
View
ICIP
2007
IEEE
15 years 3 months ago
Sensitivity Analysis Attacks Against Randomized Detectors
Sensitivity analysis attacks present a serious threat to the security of popular spread spectrum watermarking schemes. Randomization of the detector is thought to increase the imm...
Maha El Choubassi, Pierre Moulin
ER
2006
Springer
96views Database» more  ER 2006»
15 years 3 months ago
WSDL RDF Mapping: Developing Ontologies from Standardized XML Languages
The W3C is working on a Recommendation for Web Services Description Language, WSDL 2.0, based on XML. The Working Group is chartered to produce a normative mapping of WSDL into RDF...
Jacek Kopecký
GD
2006
Springer
15 years 3 months ago
Partitions of Graphs into Trees
In this paper, we study the k-tree partition problem which is a partition of the set of edges of a graph into k edge-disjoint trees. This problem occurs at several places with appl...
Therese C. Biedl, Franz-Josef Brandenburg
AISC
2008
Springer
15 years 1 months ago
High-Level Theories
We introduce high-level theories in analogy with high-level programming languages. The basic point is that even though one can define many theories via simple, low-level axiomatiza...
Jacques Carette, William M. Farmer
BPM
2008
Springer
136views Business» more  BPM 2008»
15 years 1 months ago
A Region-Based Algorithm for Discovering Petri Nets from Event Logs
The paper presents a new method for the synthesis of Petri nets from event logs in the area of Process Mining. The method derives a bounded Petri net that over-approximates the beh...
Josep Carmona, Jordi Cortadella, Michael Kishinevs...