Sciweavers

3984 search results - page 684 / 797
» A Model-Driven Transformation Method
Sort
View
IFIP
2005
Springer
15 years 9 months ago
A New Low Rank Quasi-Newton Update Scheme for Nonlinear Programming
A new quasi-Newton scheme for updating a low rank positive semi-definite Hessian approximation is described, primarily for use in sequential quadratic programming methods for non...
R. Fletcher
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 9 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
OTM
2005
Springer
15 years 9 months ago
Web Image Semantic Clustering
This paper provides a novel Web image clustering methodology based on their associated texts. In our approach, the semantics of Web images are firstly represented into vectors of t...
Zhiguo Gong, Leong Hou U, Chan Wa Cheang
SAFECOMP
2005
Springer
15 years 9 months ago
Control and Data Flow Testing on Function Block Diagrams
As programmable logic controllers(PLCs) have been used in safety-critical applications, testing of PLC applications has become important. The previous PLC-based software testing te...
Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha
UML
2005
Springer
15 years 9 months ago
Representing and Applying Design Patterns: What Is the Problem?
Design patterns embody proven solutions to recurring design problems. Ever since the gang of four popularized the concept, researchers have been trying to develop methods for repre...
Hafedh Mili, Ghizlane El-Boussaidi