Sciweavers

5101 search results - page 840 / 1021
» Capturing Context Requirements
Sort
View
IFIP
2009
Springer
13 years 5 months ago
Finite Models in FOL-Based Crypto-Protocol Verification
Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...
Jan Jürjens, Tjark Weber
CN
2010
92views more  CN 2010»
13 years 5 months ago
Deadline-based connection setup in wavelength-routed WDM networks
This article addresses the ubiquitous topic of Quality of Service (QoS) aware connection provisioning in wavelength routed WDM optical networks. The impact of the connection setup...
Wissam Fawaz, Iyad Ouaiss, Ken Chen, Harry G. Perr...
ENDM
2010
167views more  ENDM 2010»
13 years 5 months ago
Column Generation based Primal Heuristics
In the past decade, significant progress has been achieved in developing generic primal heuristics that made their way into commercial mixed integer programming (MIP) solver. Exte...
C. Joncour, S. Michel, R. Sadykov, D. Sverdlov, Fr...
IJBIS
2010
94views more  IJBIS 2010»
13 years 5 months ago
A framework towards a multi-modal fingerprinting scheme for multimedia assets
Fingerprinting is a well known approach for identifying multimedia data without having the original data present but what amounts to its essence or "DNA". Current approa...
Atta Badii, Daniel Thiemert
CASCON
2010
188views Education» more  CASCON 2010»
13 years 3 months ago
First symposium on the Personal Web
The First Symposium on the Personal Web is colocated with CASCON 2010 and is sponsored by IBM CAS Research. This symposium includes key researchers and practitioners in a range of...
Mark H. Chignell, James R. Cordy, Joanna W. Ng, Ye...