Sciweavers

2015 search results - page 115 / 403
» Hidden Software Capabilities
Sort
View
149
Voted
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
CVPR
2012
IEEE
13 years 3 months ago
Learning latent temporal structure for complex event detection
In this paper, we tackle the problem of understanding the temporal structure of complex events in highly varying videos obtained from the Internet. Towards this goal, we utilize a...
Kevin Tang, Fei-Fei Li, Daphne Koller
98
Voted
ICSE
2007
IEEE-ACM
16 years 24 days ago
Automated Generation of Context-Aware Tests
The incorporation of context-awareness capabilities into pervasive applications allows them to leverage contextual information to provide additional services while maintaining an ...
Zhimin Wang, Sebastian G. Elbaum, David S. Rosenbl...
ICWS
2009
IEEE
15 years 10 months ago
A Governance Model for SOA
Currently, business requirements for rapid operational efficiency, customer responsiveness as well as rapid adaptability are driving the need for ever increasing communication and...
Pierre de Leusse, Theodosis Dimitrakos, David Bros...
106
Voted
ICSEA
2009
IEEE
15 years 7 months ago
Rule-Based Service Modeling
— In the context of service-oriented computing, services provide the capabilities necessary to support the business, especially its processes. Within the service modeling process...
Michael Gebhart, Sebastian Abeck