Sciweavers

80 search results - page 5 / 16
» re 2009
Sort
View
AFRICACRYPT
2010
Springer
13 years 10 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
CSC
2009
13 years 8 months ago
Fast Monte Carlo Algorithms on Re-Wired Small-World Spin Models
Small-world networks have become an important model for understanding many complex phenomena in science and in sociological contexts. One tool for exploring the critical and phase...
Kenneth A. Hawick
EMNLP
2009
13 years 5 months ago
Re-Ranking Models Based-on Small Training Data for Spoken Language Understanding
The design of practical language applications by means of statistical approaches requires annotated data, which is one of the most critical constraint. This is particularly true f...
Marco Dinarelli, Alessandro Moschitti, Giuseppe Ri...
RE
2009
Springer
14 years 21 hour ago
Improving the Exchange of Requirements and Specifications between Business Partners
Increasingly complex supplier-relationships dominate product development, independent of industries and products. Mostly the primary source of risks and later problems is insuffic...
Manuel Reis Monteiro, Christof Ebert, Matthias Rec...
RE
2009
Springer
14 years 2 months ago
Semantic Criteria for Choosing a Language for Big-Step Models
With the popularity of model-driven methodologies, and the abundance of modelling languages, a major question for a requirements engineer is: which language is suitable for modell...
Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. At...