Sciweavers

2200 search results - page 121 / 440
» The Generalized Pignistic Transformation
Sort
View
ACSC
2009
IEEE
14 years 4 months ago
Improving the Transparency of Proxy Injection in Java
Due to their flexibility, proxies have been used for various purposes in standalone and distributed applications. More specifically, object-level proxies support fine grained capa...
Hendrik Gani, Caspar Ryan
CSFW
2009
IEEE
14 years 4 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...
ICIP
2007
IEEE
14 years 3 months ago
Graph-Cut Rate Distortion Algorithm for Contourlet-Based Image Compression
The geometric features of images, such as edges, are difficult to represent. When a redundant transform is used for their extraction, the compression challenge is even more dif...
Maria Trocan, Béatrice Pesquet-Popescu, Jam...
BTW
2007
Springer
93views Database» more  BTW 2007»
14 years 3 months ago
Towards an Integrated Model for Data, Metadata, and Operations
: Information integration requires manipulating data and metadata in ways that in general go beyond a single existing transformation formalism. As a result, a complete source-to-ta...
Jürgen Göres, Stefan Dessloch
SIGADA
2007
Springer
14 years 3 months ago
Using SPARK for a beginner's course on reasoning about imperative programs
Teaching beginners predicate transformer semantics for imperative languages is not a trivial task. For Computer Science majors, the teaching of the theoretical material must be su...
Kung-Kiu Lau