Sciweavers

6253 search results - page 339 / 1251
» Use Case Modeling Guidelines
Sort
View
CRYPTO
2001
Springer
136views Cryptology» more  CRYPTO 2001»
15 years 8 months ago
Session-Key Generation Using Human Passwords Only
We present session-key generation protocols in a model where the legitimate parties share only a human-memorizable password. The security guarantee holds with respect to probabilis...
Oded Goldreich, Yehuda Lindell
DATE
1999
IEEE
144views Hardware» more  DATE 1999»
15 years 8 months ago
A Method to Diagnose Faults in Linear Analog Circuits using an Adaptive Tester
This work presents a new diagnosis method for use in an adaptive analog tester. The tester is able to detect faults in any linear circuit by learning a reference behavior in a fir...
Érika F. Cota, Luigi Carro, Marcelo Lubasze...
BPM
2006
Springer
117views Business» more  BPM 2006»
15 years 8 months ago
Web Service E-Contract Establishment Using Features
Electronic contracts describe inter-organizational business processes in terms of supply and consumption of electronic services (commonly Web services). In a given contract domain,...
Marcelo Fantinato, Itana Maria de Souza Gimenes, M...
APN
2008
Springer
15 years 6 months ago
Process Discovery Using Integer Linear Programming
Abstract. The research domain of process discovery aims at constructocess model (e.g. a Petri net) which is an abstract representation of an execution log. Such a Petri net should ...
Jan Martijn E. M. van der Werf, Boudewijn F. van D...
DAM
2006
116views more  DAM 2006»
15 years 4 months ago
Using graphs for some discrete tomography problems
Given a rectangular array where entries represent the pixels of a digitalized image, we consider the problem of reconstructing an image from the number of occurrences of each colo...
Marie-Christine Costa, Dominique de Werra, Christo...