Sciweavers

6014 search results - page 947 / 1203
» Structural Testing with Use Cases
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 8 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
130
Voted
ESWS
2008
Springer
15 years 6 months ago
Numeric reasoning in the Semantic Web
Abstract. The Semantic Web is an effort by the W3C to enable integration and sharing of information across different applications and organizations using annotations by means of on...
Chimène Fankam, Stéphane Jean, Guy P...
AAAI
2010
15 years 6 months ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...
IJCAI
2003
15 years 6 months ago
Hierarchical Hidden Markov Models for Information Extraction
Information extraction can be defined as the task of automatically extracting instances of specified classes or relations from text. We consider the case of using machine learni...
Marios Skounakis, Mark Craven, Soumya Ray
GISCIENCE
2010
Springer
215views GIS» more  GISCIENCE 2010»
15 years 4 months ago
Microtheories for Spatial Data Infrastructures - Accounting for Diversity of Local Conceptualizations at a Global Level
The categorization of our environment into feature types is an essential prerequisite for cartography, geographic information retrieval, routing applications, spatial decision supp...
Stephanie Duce, Krzysztof Janowicz