Sciweavers

955 search results - page 155 / 191
» A System for Solving Constraint Satisfaction Problems with S...
Sort
View
FROCOS
2007
Springer
14 years 2 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
EMSOFT
2004
Springer
14 years 1 months ago
An approach for integrating basic retiming and software pipelining
Basic retiming is an algorithm originally developed for hardware optimization. Software pipelining is a technique proposed to increase instruction-level parallelism for parallel p...
Noureddine Chabini, Wayne Wolf
ICAPR
2009
Springer
14 years 2 months ago
Saving Electrical Power in a Surveillance Environment
—This paper proposes a smart video surveillance system with real-time moving object (primarily human) detection and identification for solving the problem of excessive power con...
Souvik Sen, Amit Kumar Das, Shyama Prosad Chowdhur...
AIED
2005
Springer
14 years 1 months ago
The Effect of Explaining on Learning: a Case Study with a Data Normalization Tutor
: Several studies have shown that explaining actions increases students’ knowledge. In this paper, we discuss how NORMIT supports self-explanation. NORMIT is a constraint-based t...
Antonija Mitrovic
PPDP
2005
Springer
14 years 1 months ago
Security policy in a declarative style
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish betwee...
Rachid Echahed, Frédéric Prost