Sciweavers

557 search results - page 73 / 112
» The L4.verified Project - Next Steps
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Security Requirements for a Semantic Service-oriented Architecture
Service-oriented architectures (SOAs) are a commonly used paradigm for IT infrastructures in various fields. Due to their flexibility and the easy accessibility of their underly...
Stefan Durbeck, Rolf Schillinger, Jan Kolter
SEMCO
2007
IEEE
14 years 1 months ago
Nested Named Entity Recognition in Historical Archive Text
This paper describes work on Named Entity Recognition (NER), in preparation for Relation Extraction (RE), on data from a historical archive organisation. As is often the case in t...
Kate Byrne
TPHOL
2007
IEEE
14 years 1 months ago
Source-Level Proof Reconstruction for Interactive Theorem Proving
Abstract. Interactive proof assistants should verify the proofs they receive from automatic theorem provers. Normally this proof reconstruction takes place internally, forming part...
Lawrence C. Paulson, Kong Woei Susanto
IWSM
2007
Springer
14 years 1 months ago
Non-Functional Requirements Size Measurement Method (NFSM) with COSMIC-FFP
Abstract. Non-functional requirements (NFRs) of software systems are an important source of uncertainty in effort estimation. Furthermore, quantitatively approaching NFR early in a...
Mohamad Kassab, Olga Ormandjieva, Maya Daneva, Ala...
SCIA
2007
Springer
14 years 1 months ago
Shadow Resistant Direct Image Registration
Direct image registration methods usually treat shadows as outliers. We propose a method which registers images in a 1D shadow invariant space. Shadow invariant image formation is ...
Daniel Pizarro, Adrien Bartoli