Sciweavers

3674 search results - page 253 / 735
» Information Dependencies
Sort
View
ITNG
2008
IEEE
14 years 5 months ago
Structural Features for Recognizing Degraded Printed Gurmukhi Script
The performance of an OCR system depends upon printing quality of the input document. Many OCRs have been designed which correctly identify fine printed documents in Indian and ot...
Manish Kumar Jindal, Rajendra Kumar Sharma, Gurpre...
LICS
2008
IEEE
14 years 5 months ago
Mechanizing the Metatheory of LF
LF is a dependent type theory in which many other formal systems can be conveniently embedded. However, correct use of LF relies on nontrivial metatheoretic developments such as p...
Christian Urban, James Cheney, Stefan Berghofer
SECURWARE
2008
IEEE
14 years 5 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
SECURWARE
2008
IEEE
14 years 5 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
IEEEIAS
2007
IEEE
14 years 5 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...