Sciweavers

3238 search results - page 465 / 648
» Not Enough Points Is Enough
Sort
View
TCS
2002
13 years 10 months ago
Logical systems for structured specifications
We study proof systems for reasoning about logical consequences and refinement of structured specifications, based on similar systems proposed earlier in the literature [ST 88, Wi...
Tomasz Borzyszkowski
VLDB
2002
ACM
74views Database» more  VLDB 2002»
13 years 10 months ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 10 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
IVC
2007
97views more  IVC 2007»
13 years 10 months ago
Stochastic exploration and active learning for image retrieval
This paper deals with content-based image retrieval. When the user is looking for large categories, statistical classification techniques are efficient as soon as the training se...
Matthieu Cord, Philippe Henri Gosselin, Sylvie Phi...
MJ
2007
76views more  MJ 2007»
13 years 10 months ago
Degradation analysis in asymmetric sampled grating distributed feedback laser diodes
This paper presents the experimental observation of the degradation in asymmetric sampled grating DFB lasers by the accelerated life tests. Two degradation phenomena related to th...
Han Sung Joo, Sang-Wan Ryu, Jeha Kim, Ilgu Yun