Sciweavers

784 search results - page 66 / 157
» An underlying model for defeat mechanisms
Sort
View
BMVC
1997
14 years 11 months ago
Real-time Dynamic Deformable Meshes for Volumetric Segmentation and Visualisation
This paper presents a surface segmentation method which uses a simulated inflating balloon model to segment surface structure from volumetric data using a triangular mesh. The mod...
Richard Bowden, T. A. Mitchell, M. Sahardi
ISF
2007
139views more  ISF 2007»
14 years 9 months ago
Integrated model-driven dashboard development
Abstract Business performance modeling and model-driven business transformation are two research directions that are attracting much attention lately. In this study, we propose an ...
Themis Palpanas, Pawan Chowdhary, George A. Mihail...
OTM
2010
Springer
14 years 8 months ago
A Process View Framework for Artifact-Centric Business Processes
Over the past several years, the artifact-centric approach to workflow has emerged as a new paradigm of business process modelling. It provides a robust structure of workflow and s...
Sira Yongchareon, Chengfei Liu
EUROCRYPT
2004
Springer
15 years 3 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
CISIS
2009
IEEE
15 years 4 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...