Sciweavers

5525 search results - page 931 / 1105
» Verification of Model Transformations
Sort
View
DEXAW
2007
IEEE
104views Database» more  DEXAW 2007»
15 years 10 months ago
An MDA Approach to Implement Personal IR Tools
We introduce TIRA1 , a software architecture for the rapid prototyping of tailored information retrieval (IR) tools. TIRA allows to compose personal IR tools from atomic IR servic...
Sven Meyer zu Eissen, Benno Stein
LICS
2007
IEEE
15 years 10 months ago
Local Action and Abstract Separation Logic
tion and Abstract Separation Logic Cristiano Calcagno Imperial College, London Peter W. O’Hearn Queen Mary, University of London Hongseok Yang Queen Mary, University of London S...
Cristiano Calcagno, Peter W. O'Hearn, Hongseok Yan...
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
15 years 10 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 10 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CLEAR
2007
Springer
144views Biometrics» more  CLEAR 2007»
15 years 10 months ago
The SRI-ICSI Spring 2007 Meeting and Lecture Recognition System
We describe the latest version of the SRI-ICSI meeting and lecture recognition system, as was used in the NIST RT-07 evaluations, highlighting improvements made over the last year....
Andreas Stolcke, Xavier Anguera, Kofi Boakye, &Oum...