Sciweavers

2740 search results - page 150 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
ISW
2004
Springer
14 years 4 months ago
Security Analysis of Two Signcryption Schemes
Signcryption is a new cryptographic primitive that performs signing and encryption simultaneously, at a cost significantly lower than that required by the traditional signature-th...
Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-J...
CLEF
2009
Springer
13 years 12 months ago
A Rule-Based Acquisition Model Adapted for Morphological Analysis
We adapt the cognitively-oriented morphology acquisition model proposed in (Chan 2008) to perform morphological analysis, extending its concept of base-derived relationships to all...
Constantine Lignos, Erwin Chan, Mitchell P. Marcus...
IDA
2008
Springer
13 years 10 months ago
A comprehensive analysis of hyper-heuristics
Meta-heuristics such as simulated annealing, genetic algorithms and tabu search have been successfully applied to many difficult optimization problems for which no satisfactory pro...
Ender Özcan, Burak Bilgin, Emin Erkan Korkmaz
ENTCS
2007
105views more  ENTCS 2007»
13 years 10 months ago
A Probabilistic Scheduler for the Analysis of Cryptographic Protocols
When modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It...
Srecko Brlek, Sardaouna Hamadou, John Mullins
TMI
2008
138views more  TMI 2008»
13 years 10 months ago
Dynamic Positron Emission Tomography Data-Driven Analysis Using Sparse Bayesian Learning
A method is presented for the analysis of dynamic positron emission tomography (PET) data using sparse Bayesian learning. Parameters are estimated in a compartmental framework usin...
Jyh-Ying Peng, John A. D. Aston, R. N. Gunn, Cheng...