Sciweavers

11740 search results - page 2203 / 2348
» More Problems in Rewriting
Sort
View
CIKM
1999
Springer
14 years 1 months ago
Architecture of a Networked Image Search and Retrieval System
Large scale networked image retrieval systems face a number of problems that are not fully satis ed by current systems. On one hand, integrated solutions that store all image data...
Roger Weber, Jürg Bolliger, Thomas R. Gross, ...
ISIPTA
1999
IEEE
116views Mathematics» more  ISIPTA 1999»
14 years 1 months ago
On the Distribution of Natural Probability Functions
The purpose of this note is to describe the underlying insights and results obtained by the authors, and others, in a series of papers aimed at modelling the distribution of `natu...
Jeff B. Paris, Paul N. Watton, George M. Wilmers
EDCC
1999
Springer
14 years 1 months ago
Dependability Modelling and Sensitivity Analysis of Scheduled Maintenance Systems
Abstract. In this paper we present a new modelling approach for dependability evaluation and sensitivity analysis of Scheduled Maintenance Systems, based on a Deterministic and Sto...
Andrea Bondavalli, Ivan Mura, Kishor S. Trivedi
ESEC
1999
Springer
14 years 1 months ago
Synergy between Component-Based and Generative Approaches
Building software systems out of pre-fabricated components is a very attractive vision. Distributed Component Platforms (DCP) and their visual development environments bring this v...
Stan Jarzabek, Peter Knauber
EUROCRYPT
1999
Springer
14 years 1 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
« Prev « First page 2203 / 2348 Last » Next »