Sciweavers

1573 search results - page 283 / 315
» Strong User Authentication
Sort
View
JLP
2006
111views more  JLP 2006»
14 years 9 months ago
Executable structural operational semantics in Maude
This paper describes in detail how to bridge the gap between theory and practice when implementing in Maude structural operational semantics described in rewriting logic, where tr...
Alberto Verdejo, Narciso Martí-Oliet
MP
2006
119views more  MP 2006»
14 years 9 months ago
Approximate extended formulations
Mixed integer programming (MIP) formulations are typically tightened through the use of a separation algorithm and the addition of violated cuts. Using extended formulations involv...
Mathieu Van Vyve, Laurence A. Wolsey
SCP
2008
76views more  SCP 2008»
14 years 9 months ago
Garbage collection: Java application servers' Achilles heel
Java application servers are gaining popularity as a way for businesses to conduct day-to-day operations. While strong emphasis has been placed on how to obtain peak performance, ...
Feng Xian, Witawas Srisa-an, Hong Jiang
IJEB
2007
78views more  IJEB 2007»
14 years 9 months ago
E-government: a comparison of strategies in local authorities in the UK and Norway
In Europe almost all countries have implemented some form of e-government, not to mention the UK and Norway which are now both well into their sixth year of e-government implement...
Vishanth Weerakkody, Steve Jones, Elisabeth Olsen
TASLP
2008
89views more  TASLP 2008»
14 years 9 months ago
A Cascaded Broadcast News Highlighter
Abstract-- This paper presents a fully automatic news skimming system which takes a broadcast news audio stream and provides the user with the segmented, structured and highlighted...
Heidi Christensen, Yoshihiko Gotoh, Steve Renals