Sciweavers

2703 search results - page 168 / 541
» Learning operational requirements from goal models
Sort
View
IACR
2011
73views more  IACR 2011»
12 years 7 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
BIS
2006
132views Business» more  BIS 2006»
13 years 9 months ago
Utilizing Successful Work Practice for Business Process Evolution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, business processes are always evolving in cur...
Ruopeng Lu, Shazia Wasim Sadiq, Guido Governatori
ICALT
2010
IEEE
13 years 8 months ago
Towards a Competence Based System for Recommending Study Materials (CBSR)
— Most e-learning systems require intervention from a teacher. The development of adaptive hypermedia systems, such as intelligent tutoring systems, aimed to reduce the teachersâ...
Athitaya Nitchot, Lester Gilbert, Gary B. Wills
CEC
2005
IEEE
14 years 1 months ago
An empirical analysis of the grouping genetic algorithm: the timetabling case
A grouping genetic algorithm (GGA) for the university course timetabling problem is outlined. We propose six different fitness functions, all sharing the same common goal, and look...
Rhydian Lewis, Ben Paechter
SIGOPSE
2000
ACM
14 years 16 days ago
Gaia: enabling active spaces
Ubiquitous computing promotes physical spaces with hundreds of specialized embedded devices that increase our productivity, alleviate some specific everyday tasks and provide new ...
Manuel Román, Roy H. Campbell