Sciweavers

1527 search results - page 14 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
ICDAR
2011
IEEE
12 years 7 months ago
Fast Key-Word Searching via Embedding and Active-DTW
—In this paper we present a novel approach for fast search of handwritten Arabic word-parts within large lexicons. The algorithm runs through three steps to achieve the required ...
Raid Saabni, Alex Bronstein
NDSS
2000
IEEE
14 years 1 days ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
BPM
2007
Springer
165views Business» more  BPM 2007»
13 years 11 months ago
Modeling Requirements for Value Configuration Design
Breadth and depth complexity are key challenges in achieving business process fusion as the enabler for value configuration design. The PARM framework is proposed as the requiremen...
Eng Chew, Igor Hawryszkiewycz, Michael Soanes
CCR
2002
81views more  CCR 2002»
13 years 7 months ago
Rationalizing key design decisions in the ATM user plane
Any technology requires some number of key design decisions. In the case of the ATM user plane, the choices to use fixed length, 53 byte cells and virtual connections were unortho...
Daniel B. Grossman
FAC
2006
122views more  FAC 2006»
13 years 7 months ago
The verified software repository: a step towards the verifying compiler
The Verified Software Repository is dedicated to a long-term vision of a future in which all computer systems justify the trust that Society increasingly places in them. This will ...
Juan Bicarregui, C. A. R. Hoare, J. C. P. Woodcock