Sciweavers

899 search results - page 136 / 180
» Using Method Engineering for the Construction of Agent-Orien...
Sort
View
ICSE
2000
IEEE-ACM
14 years 8 days ago
An inheritance-based technique for building simulation proofs incrementally
This paper presents a technique for incrementally constructing safety specifications, abstract algorithm descriptions, and simulation proofs showing that algorithms meet their spe...
Idit Keidar, Roger Khazan, Nancy A. Lynch, Alexand...
CIKM
2009
Springer
14 years 3 months ago
Beyond hyperlinks: organizing information footprints in search logs to support effective browsing
While current search engines serve known-item search such as homepage finding very well, they generally cannot support exploratory search effectively. In exploratory search, user...
Xuanhui Wang, Bin Tan, Azadeh Shakery, ChengXiang ...
DRM
2007
Springer
14 years 2 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
VRML
1999
ACM
14 years 29 days ago
Transparent Access to and Encoding of VRML State Information
In this paper we propose a concept for transparent access to VRML state information. Our approach enhances VRML browsers to provide additional functionality instead of placing the...
Martin Mauve
COMSWARE
2006
IEEE
14 years 2 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...