Sciweavers

467 search results - page 54 / 94
» Open bisimulation for aspects
Sort
View
112
Voted
STACS
1992
Springer
15 years 7 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
ATAL
2008
Springer
15 years 5 months ago
WADE: a software platform to develop mission critical applications exploiting agents and workflows
In this paper, we describe two mission critical applications currently deployed by Telecom Italia in the Operations Support System domains. The first one called "Network Neut...
Giovanni Caire, Danilo Gotta, Massimo Banzi
143
Voted
ODRL
2004
15 years 5 months ago
Nonius: Implementing a DRM Extension to an XML Browser
The paper describes experiences, ideas, and problems that were discovered while developing a digital rights management (DRM) extension to an XML browser. The supported rights desc...
Olli Pitkänen, Ville Saarinen, Jari Anttila, ...
134
Voted
ENTCS
2008
137views more  ENTCS 2008»
15 years 3 months ago
Computerizing Mathematical Text with MathLang
Mathematical texts can be computerized in many ways that capture differing amounts of the mathematical meaning. At one end, there is document imaging, which captures the arrangeme...
Fairouz Kamareddine, J. B. Wells
133
Voted
ICCV
2009
IEEE
16 years 8 months ago
TagProp: Discriminative Metric Learning in Nearest Neighbor Models for Image Auto-Annotation
Image auto-annotation is an important open problem in computer vision. For this task we propose TagProp, a discriminatively trained nearest neighbor model. Tags of test images a...
Matthieu Guillaumin, Thomas Mensink, Jakob Verbeek...