Sciweavers

605 search results - page 12 / 121
» A strategy for efficiently verifying requirements
Sort
View
IJACT
2008
64views more  IJACT 2008»
13 years 7 months ago
An efficient one-move Nominative Signature scheme
Abstract. A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified w...
Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong
IEEECIT
2006
IEEE
14 years 1 months ago
Research on a Mechanism for Assisting Service Retrieval
Through as an important part of service-oriented system architecture, service retrieval receives much attention from industry and academia and many methods have been proposed, the...
Bin Tang, Leqiu Qian, Ruzhi Xu, Yunjiao Xue, Hui T...
FLAIRS
2006
13 years 9 months ago
Focusing Strategies for Multiple Fault Diagnosis
Diagnosing multiple faults for a complex system is often very difficult. It requires not only a model which adequately represents the diagnostic aspect of a complex system, but al...
Tsai-Ching Lu, K. Wojtek Przytula
IEEEARES
2010
IEEE
14 years 2 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
LREC
2010
173views Education» more  LREC 2010»
13 years 9 months ago
Transcriber Driving Strategies for Transcription Aid System
Speech recognition technology suffers from a lack of robustness which limits its usability for fully automated speech-to-text transcription, and manual correction is generally req...
Grégory Senay, Georges Linares, Benjamin Le...