Sciweavers

1626 search results - page 283 / 326
» The method evaluation model: a theoretical model for validat...
Sort
View
ACISICIS
2007
IEEE
14 years 2 months ago
A Framework to Detect Deviations During Process Enactment
People enacting processes deviate from the process definition for a variety of different reasons, the consequences of which may be either positive or negative. Detecting deviation...
Sean Thompson, Torab Torabi, Purva Joshi
ITCC
2005
IEEE
14 years 1 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
AMET
1998
Springer
14 years 1 days ago
Bidding Strategies for Trading Agents in Auction-Based Tournaments
Abstract. Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents...
Pere Garcia, Eduardo Giménez, Lluis Godo, J...
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
CORR
2010
Springer
111views Education» more  CORR 2010»
13 years 8 months ago
Recognition and translation Arabic-French of Named Entities: case of the Sport places
The recognition of Arabic Named Entities (NE) is a problem in different domains of Natural Language Processing (NLP) like automatic translation. Indeed, NE translation allows the ...
Abdelmajid Ben Hamadou, Odile Piton, Héla F...