Sciweavers

13987 search results - page 2648 / 2798
» The Two Guards Problem
Sort
View
ICSE
2009
IEEE-ACM
14 years 20 days ago
A-SCORE: Automatic software component recommendation using coding context
Reusing software components (e.g. classes or modules) improves software quality and developer’s productivity. Unfortunately, developers may miss many reusing opportunities since...
Ryuji Shimada, Yasuhiro Hayase, Makoto Ichii, Mako...
CCS
2001
ACM
14 years 17 days ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
CRYPTO
2001
Springer
202views Cryptology» more  CRYPTO 2001»
14 years 17 days ago
Revocation and Tracing Schemes for Stateless Receivers
We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of...
Dalit Naor, Moni Naor, Jeffery Lotspiech
DIS
2001
Springer
14 years 17 days ago
Functional Trees
In the context of classification problems, algorithms that generate multivariate trees are able to explore multiple representation languages by using decision tests based on a com...
Joao Gama
ECML
2001
Springer
14 years 17 days ago
Learning of Variability for Invariant Statistical Pattern Recognition
In many applications, modelling techniques are necessary which take into account the inherent variability of given data. In this paper, we present an approach to model class speci...
Daniel Keysers, Wolfgang Macherey, Jörg Dahme...
« Prev « First page 2648 / 2798 Last » Next »