Sciweavers

324 search results - page 57 / 65
» Model Transformations in Practice Workshop
Sort
View
ISPEC
2005
Springer
15 years 3 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
TMI
2010
133views more  TMI 2010»
14 years 8 months ago
Synthetic Magnetic Resonance Imaging Revisited
—Synthetic magnetic resonance (MR) imaging is an approach suggested in the literature to predict MR images at different design parameter settings from at least three observed MR ...
Ranjan Maitra, John J. Riddles
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
14 years 4 months ago
On subspace identification of cascade structured systems
Subspace identification has proven useful when identifying identifying multi-input multi-output systems. It is, however, important in many applications to take a priori structural ...
Per Hagg, Bo Wahlberg, Henrik Sandberg
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
14 years 23 days ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
SEMWEB
2009
Springer
15 years 4 months ago
Towards a Graphical Notation for OWL 2
The Ontology Definition Metamodel (ODM) defines a set of UML metamodels and profiles for development of RDF and OWL. The UML profiles in the ODM specification adapt UML notations t...
Elisa F. Kendall, Roy Bell, Roger Burkhart, Mark D...