Sciweavers

6253 search results - page 151 / 1251
» Use Case Modeling Guidelines
Sort
View
CCS
2008
ACM
15 years 4 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
HICSS
2006
IEEE
105views Biometrics» more  HICSS 2006»
15 years 9 months ago
The Impact of Design Moves on Platform Adoption: The Case of Microsoft Windows OS
How soon will firms form alliances with a platform provider? What factors impact the decision and the speed with which firms first move into partnerships with a platform provider ...
Xiang Liu, Chi-Hyon Lee, Bala Iyer
ISMIR
2005
Springer
135views Music» more  ISMIR 2005»
15 years 8 months ago
Automatic X Traditional Descriptor Extraction: the Case of Chord Recognition
Audio descriptor extraction is the activity of finding mathematical models which describe properties of the sound, requiring signal processing skills. The scientific literature pr...
Giordano Ribeiro de Eulalio Cabral, Françoi...
EDBTW
2004
Springer
15 years 8 months ago
The Case for Mobile OLAP
Abstract. On-Line Analytical Processing (OLAP) is a trend in database technology, based on the multidimensional view of data. Numerous applications and development environments exi...
Andreas S. Maniatis
HICSS
2003
IEEE
128views Biometrics» more  HICSS 2003»
15 years 8 months ago
Developing a Community Vision: The Case of a Regional United Way
This paper provides descriptive research about a successful collaborative vision development process undertaken for a regional United Way. The entire process from learning about t...
Bradd C. Hayes