Sciweavers

2703 search results - page 191 / 541
» Learning operational requirements from goal models
Sort
View
CCS
2005
ACM
14 years 1 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
APWEB
2005
Springer
14 years 1 months ago
PODWIS: A Personalized Tool for Ontology Development in Domain Specific Web Information System
Complex structure and varying requirements increase the difficulties in developing domain specific Web Information Systems. People appeal to a smart tool to customize Web Informati...
Lv-an Tang, Hongyan Li, Zhiyong Pan, Shaohua Tan, ...
CIDM
2007
IEEE
14 years 6 days ago
Efficient Kernel-based Learning for Trees
Kernel methods are effective approaches to the modeling of structured objects in learning algorithms. Their major drawback is the typically high computational complexity of kernel ...
Fabio Aiolli, Giovanni Da San Martino, Alessandro ...
EDOC
2006
IEEE
14 years 2 months ago
Exploring Intentional Modeling and Analysis for Enterprise Architecture
— An enterprise architecture is intended to be a comprehensive blueprint describing the key components and relationships for an enterprise from strategies to business processes t...
Eric S. K. Yu, Markus Strohmaier, Xiaoxue Deng
TASLP
2010
118views more  TASLP 2010»
13 years 6 months ago
Time-Frequency Sparsity by Removing Perceptually Irrelevant Components Using a Simple Model of Simultaneous Masking
Abstract—We present an algorithm for removing timefrequency components, found by a standard Gabor transform, of a “real-world” sound while causing no audible difference to th...
Péter Balázs, Bernhard Laback, Gerha...