Sciweavers

23413 search results - page 14 / 4683
» or 2005
Sort
View
UML
2005
Springer
15 years 2 months ago
MoDELS 2005 Doctoral Symposium Summary
The MoDELS Doctoral Symposium brought together nine doctoral students and five mentors to spend a day discussing student research presentations. A truly international representatio...
Jeff Gray
CLEF
2005
Springer
15 years 3 months ago
The Use of MedGIFT and EasyIR for ImageCLEF 2005
This article describes the use of the medGIFT and easyIR retrieval systems for three of the four ImageCLEF 2005 retrieval tasks. We participated in the ad–hoc retrieval task that...
Henning Müller, Antoine Geissbühler, Joh...
INEX
2005
Springer
15 years 2 months ago
TIJAH Scratches INEX 2005: Vague Element Selection, Image Search, Overlap, and Relevance Feedback
Retrieving information from heterogeneous data sources in a flexible manner and within a single (database) framework is still a challenge. In this paper we present several extensi...
Vojkan Mihajlovic, Georgina Ramírez, Thijs ...
IJNSEC
2008
118views more  IJNSEC 2008»
14 years 9 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
PKC
2011
Springer
169views Cryptology» more  PKC 2011»
14 years 7 days ago
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
At TCC 2005, Groth underlined the usefulness of working in small RSA subgroups of hidden order. In assessing the security of the relevant hard problems, however, the best attack co...
Jean-Sébastien Coron, Antoine Joux, Avradip...