Sciweavers

15783 search results - page 2985 / 3157
» Evidence-Based Software Engineering
Sort
View
CCS
2008
ACM
15 years 4 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
CLEF
2008
Springer
15 years 4 months ago
Robust Question Answering for Speech Transcripts: UPC Experience in QAst 2008
This paper describes the participation of the Technical University of Catalonia in the CLEF 2008 Question Answering on Speech Transcripts track. We have participated in the Englis...
Pere Comas, Jordi Turmo
ECAI
2008
Springer
15 years 4 months ago
Can URML Model Successfully Drools Rules?
The use of rules in business modeling is becoming more and more important, in applications requiring dynamic change of behavior. A number of rule languages and tools have been prop...
Emilian Pascalau, Adrian Giurca
134
Voted
EDOC
2008
IEEE
15 years 4 months ago
A Model Driven Approach to Represent Sequence Diagrams as Free Choice Petri Nets
Model Driven Development (MDD) aims to promote the role of modeling in Software Engineering. Enterprise systems and architectures are often modeled via multiple representations. F...
Mohamed Ariff Ameedeen, Behzad Bordbar
EGOV
2008
Springer
15 years 4 months ago
Test Strategies for Evaluation of Semantic eGovernment Applications
In this paper we present a framework for identifying the test focus and test objectives based on the assumption that automatic information processing based on encoded meaning is th...
Ralf Klischewski, Stefan Ukena
« Prev « First page 2985 / 3157 Last » Next »