Sciweavers

844 search results - page 44 / 169
» Further results on concordance relations
Sort
View
ICCS
2004
Springer
15 years 3 months ago
A Note on Data-Driven Contaminant Simulation
Abstract. In this paper we introduce a numerical procedure for performing dynamic data driven simulations (DDDAS). The main ingredient of our simulation is the multiscale interpola...
Craig C. Douglas, Chad E. Shannon, Yalchin Efendie...
IWDW
2004
Springer
15 years 3 months ago
A Multi-feature Based Invertible Authentication Watermarking for JPEG Images
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang
TCC
2004
Springer
118views Cryptology» more  TCC 2004»
15 years 3 months ago
A General Composition Theorem for Secure Reactive Systems
Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ESAW
2003
Springer
15 years 2 months ago
A Design Complexity Evaluation Framework for Agent-Based System Engineering Methodologies
Abstract. Complexity in software design refers to the difficulty in understanding and manipulating the set of concepts, models and techniques involved in the design process. Agents...
Anthony Karageorgos, Nikolay Mehandjiev
CBSE
2009
Springer
15 years 2 months ago
Extracting Behavior Specification of Components in Legacy Applications
A challenge of componentizing legacy applications is to extract behavior specification of suggested components. It is desirable to preserve a relation between the original structur...
Tomás Poch, Frantisek Plasil