Sciweavers

695 search results - page 138 / 139
» Refactoring Feature Modules
Sort
View
SCN
2010
Springer
138views Communications» more  SCN 2010»
15 years 19 days ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
98
Voted
TMI
2010
96views more  TMI 2010»
15 years 18 days ago
Statistics of Optical Coherence Tomography Data From Human Retina
—Optical coherence tomography (OCT) has recently become one of the primary methods for noninvasive probing of the human retina. The pseudoimage formed by OCT (the so-called B-sca...
Norberto M. Grzywacz, Joaquín de Juan, Clau...
124
Voted
ACSD
2010
IEEE
251views Hardware» more  ACSD 2010»
15 years 8 days ago
Modular Interpretation of Heterogeneous Modeling Diagrams into Synchronous Equations Using Static Single Assignment
Abstract--The ANR project SPaCIFY develops a domainspecific programming environment, Synoptic, to engineer embedded software for space applications. Synoptic is an Eclipse-based mo...
Jean-Pierre Talpin, Julien Ouy, Thierry Gautier, L...
INLG
2010
Springer
15 years 4 days ago
Finding Common Ground: Towards a Surface Realisation Shared Task
In many areas of NLP reuse of utility tools such as parsers and POS taggers is now common, but this is still rare in NLG. The subfield of surface realisation has perhaps come clos...
Anja Belz, Mike White, Josef van Genabith, Deirdre...
SECON
2010
IEEE
15 years 3 days ago
iPoint: A Platform-Independent Passive Information Kiosk for Cell Phones
We introduce iPoint, a passive device that can interact and deliver information to virtually any mobile phone equipped with a WiFi network interface and a camera. The iPoint does n...
Hooman Javaheri, Guevara Noubir