Sciweavers

1763 search results - page 277 / 353
» A Formalization of Polytime Functions
Sort
View
ISPEC
2005
Springer
15 years 3 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
UML
2005
Springer
15 years 3 months ago
Simplifying Autonomic Enterprise Java Bean Applications Via Model-Driven Development: A Case Study
Autonomic computer systems aim to reduce the configuration, operational, and maintenance costs of distributed applications by enabling them to self-manage, self-heal, self-optimiz...
Jules White, Douglas C. Schmidt, Aniruddha S. Gokh...
VLSM
2005
Springer
15 years 3 months ago
Denoising Tensors via Lie Group Flows
The need to regularize tensor fields arise recently in various applications. We treat in this paper tensors that belong to matrix Lie groups. We formulate the problem of these SO(...
Yaniv Gur, Nir A. Sochen
DOCENG
2004
ACM
15 years 3 months ago
On modular transformation of structural content
We show that an XML DTD (Document Type Definition) can be viewed as the fixed point of a parametric content model. We then use natural transformations from the source content mo...
Tyng-Ruey Chuang, Jan-Li Lin
SBCCI
2004
ACM
111views VLSI» more  SBCCI 2004»
15 years 3 months ago
A partial reconfigurable architecture for controllers based on Petri nets
Digital Control System in the industry has been used in most of the applications based on expensive Programmable Logical Controllers (PLC). These Systems are, in general, highly c...
Paulo Sérgio B. do Nascimento, Paulo Romero...