Sciweavers

34181 search results - page 6637 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
135
Voted
ICISC
2008
123views Cryptology» more  ICISC 2008»
15 years 5 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
IIWAS
2008
15 years 5 months ago
A model-prover for constrained dynamic conversations
In a service-oriented architecture, systems communicate by exchanging messages. In this work, we propose a formal model based on OCL-constrained UML Class diagrams and a methodolo...
Diletta Cacciagrano, Flavio Corradini, Rosario Cul...
IPCO
2008
163views Optimization» more  IPCO 2008»
15 years 5 months ago
The Air Traffic Flow Management Problem: An Integer Optimization Approach
In this paper, we present a new Integer Program (IP) for the Air Traffic Flow Management (ATFM) problem. The model we propose provides a complete representation of all the phases o...
Dimitris Bertsimas, Guglielmo Lulli, Amedeo R. Odo...
IPCO
2008
118views Optimization» more  IPCO 2008»
15 years 5 months ago
Constraint Orbital Branching
Orbital branching is a method for branching on variables in integer programming that reduces the likelihood of evaluating redundant, isomorphic nodes in the branch-and-bound proce...
James Ostrowski, Jeff Linderoth, Fabrizio Rossi, S...
LREC
2008
84views Education» more  LREC 2008»
15 years 5 months ago
A Test Suite for Inference Involving Adjectives
Recently, most of the research in NLP has concentrated on the creation of applications coping with textual entailment. However, there still exist very few resources for the evalua...
Marilisa Amoia, Claire Gardent
« Prev « First page 6637 / 6837 Last » Next »