Sciweavers

780 search results - page 120 / 156
» Correctness of Component-Based Adaptation
Sort
View
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption
Abstract. Non-committing encryption enables the construction of multiparty computation protocols secure against an adaptive adversary in the computational setting where private cha...
Ivan Damgård, Jesper Buus Nielsen
IPPS
1999
IEEE
14 years 1 months ago
High-Performance Knowledge Extraction from Data on PC-Based Networks of Workstations
The automatic construction of classi ers programs able to correctly classify data collected from the real world is one of the major problems in pattern recognition and in a wide ar...
Cosimo Anglano, Attilio Giordana, Giuseppe Lo Bell...
KBSE
1999
IEEE
14 years 1 months ago
An Integration of Deductive Retrieval into Deductive Synthesis
Deductive retrieval and deductive synthesis are two conceptually closely related software development methods which apply theorem proving techniques to support the construction of...
Bernd Fischer 0002, Jon Whittle
WER
1999
Springer
14 years 1 months ago
A Requirements Elicitation Approach Based in Templates and Patterns
One of the main problems of requirements elicitation is expressing customer requirements in a form that can be understood not only by requirements engineers but also by noncomputer...
Amador Durán Toro, B. Bernárdez Jim&...
ASSISTIVE
1998
Springer
14 years 1 months ago
Providing Intelligent Language Feedback for Augmentative Communication Users
People with severe speech and motor impairments SSMI can often use augmentative communication devices to help them communicate. While these devices can provide speech synthesis or ...
Christopher A. Pennington, Kathleen F. McCoy