Sciweavers

605 search results - page 59 / 121
» A strategy for efficiently verifying requirements
Sort
View
TCOS
2010
13 years 3 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
ECCV
2004
Springer
14 years 11 months ago
Matching Tensors for Automatic Correspondence and Registration
Abstract. Complete 3-D modeling of a free-form object requires acquisition from multiple view-points. These views are then required to be registered in a common coordinate system b...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens
POPL
2008
ACM
14 years 9 months ago
Lightweight semiformal time complexity analysis for purely functional data structures
Okasaki and others have demonstrated how purely functional data structures that are efficient even in the presence of persistence can be constructed. To achieve good time bounds e...
Nils Anders Danielsson
GLOBECOM
2007
IEEE
14 years 3 months ago
Performing Packet Content Inspection by Longest Prefix Matching Technology
—This article presents a novel mechanism to perform packet content inspection by longest prefix matching (LPM) technology. It is done by transforming the automaton-based state ta...
Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu, Chia-Wen H...
BPM
2005
Springer
85views Business» more  BPM 2005»
14 years 2 months ago
Modeling and Analysis of Mobile Service Processes by Example of the Housing Industry
This article describes the method of Mobile Process Landscaping by example of a project in which the service processes of a company from the housing industry were analyzed regardin...
Volker Gruhn, André Köhler, Robert Kla...