Sciweavers

310 search results - page 30 / 62
» Why Delannoy numbers
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 11 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
VCIP
2000
146views Communications» more  VCIP 2000»
13 years 11 months ago
Novel video coding scheme using adaptive mesh-based interpolation and node tracking
An alternative method to H.263 for encoding of moving images at bit rates below 64 kbit/s is presented using adaptive spatial subsampling, mesh based interpolation and node tracki...
Eckhart Baum, Joachim Speidel
JAIR
2007
146views more  JAIR 2007»
13 years 9 months ago
Reasoning with Very Expressive Fuzzy Description Logics
It is widely recognized today that the management of imprecision and vagueness will yield more intelligent and realistic knowledge-based applications. Description Logics (DLs) are...
Giorgos Stoilos, Giorgos B. Stamou, Jeff Z. Pan, V...
TSE
2008
115views more  TSE 2008»
13 years 9 months ago
Do Crosscutting Concerns Cause Defects?
There is a growing consensus that crosscutting concerns harm code quality. An example of a crosscutting concern is a functional requirement whose implementation is distributed acro...
Marc Eaddy, Thomas Zimmermann, Kaitin D. Sherwood,...
ICDM
2006
IEEE
76views Data Mining» more  ICDM 2006»
14 years 3 months ago
How Bayesians Debug
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...
Chao Liu 0001, Zeng Lian, Jiawei Han