Sciweavers

2810 search results - page 507 / 562
» Contract-Based Component System Design
Sort
View
SLE
2009
Springer
15 years 5 months ago
A Role-Based Approach towards Modular Language Engineering
Modularisation can reduce the effort in designing and maintaining language specifications. Existing approaches to language modularisation are typically either focused on language ...
Christian Wende, Nils Thieme, Steffen Zschaler
CBMS
2008
IEEE
15 years 5 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 5 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
ISCAS
2006
IEEE
98views Hardware» more  ISCAS 2006»
15 years 5 months ago
Towards rate-distortion tradeoff in real-time color video coding
—In this paper, we address the key problem in real-time video coding, the rate-distortion (R-D) tradeoff. As most video coding applications employ color images, we analyze the R-...
Zhenzhong Chen, King Ngi Ngan
ESCIENCE
2005
IEEE
15 years 4 months ago
On the Costs for Reliable Messaging in Web/Grid Service Environments
As Web Services have matured they have been substantially leveraged within the academic, research and business communities. An exemplar of this is the realignment, last year, of t...
Shrideep Pallickara, Geoffrey Fox, Beytullah Yildi...