Sciweavers

10790 search results - page 2116 / 2158
» Using feature models to automate model transformations
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 10 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
GPCE
2005
Springer
15 years 10 months ago
A Generative Programming Approach to Developing DSL Compilers
Abstract. Domain-Specific Languages (DSLs) represent a proven approach to raising the abstraction level of programming. They offer highlevel constructs and notations dedicated to...
Charles Consel, Fabien Latry, Laurent Révei...
ICMI
2005
Springer
267views Biometrics» more  ICMI 2005»
15 years 10 months ago
XfaceEd: authoring tool for embodied conversational agents
In this paper, XfaceEd, our open source, platform independent tool for authoring 3D embodied conversational agents (ECAs) is presented. Following MPEG-4 Facial Animation (FA) stan...
Koray Balci
MM
2003
ACM
160views Multimedia» more  MM 2003»
15 years 9 months ago
VideoQA: question answering on news video
When querying a news video archive, the users are interested in retrieving precise answers in the form of a summary that best answers the query. However, current video retrieval s...
Hui Yang, Lekha Chaisorn, Yunlong Zhao, Shi-Yong N...
HYBRID
2010
Springer
15 years 9 months ago
Safe compositional network sketches: formal framework
NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch assists system integr...
Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Mi...
« Prev « First page 2116 / 2158 Last » Next »