Sciweavers

347 search results - page 35 / 70
» Overview of INEX 2005
Sort
View
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
14 years 1 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto
DAGM
2005
Springer
14 years 1 months ago
Multi-lingual and Multi-modal Speech Processing and Applications
Over the last decade voice technologies for telephony and embedded solutions became much more mature, resulting in applications providing mobile access to digital information from ...
Jozef Ivanecký, Julia Fischer, Marion Mast,...
DGCI
2005
Springer
14 years 1 months ago
Uncertain Geometry in Computer Vision
Abstract. We give an overview of the main ideas and tools that have been employed in uncertain geometry. We show how several recognition problems in computer vision can be translat...
Peter Veelaert
EWSA
2005
Springer
14 years 1 months ago
On the Systematic Conformance Check of Software Artefacts
Abstract. In this paper we present a systematic check of the conformance of the implemented and the intended software architecture. Nowadays industry is confronted with rapidly evo...
Hylke W. van Dijk, Bas Graaf, Rob Boerman
FCA
2005
Springer
201views Formal Methods» more  FCA 2005»
14 years 1 months ago
A Survey of Formal Concept Analysis Support for Software Engineering Activities
Formal Concept Analysis (FCA) has typically been applied in the field of software engineering to support software maintenance and object-oriented class identification tasks. This...
Thomas Tilley, Richard Cole, Peter Becker 0002, Pe...