Sciweavers

6434 search results - page 964 / 1287
» Model Transformations with Reference Models
Sort
View
CCS
2008
ACM
15 years 6 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
BIS
2009
168views Business» more  BIS 2009»
15 years 5 months ago
Defining Adaptation Constraints for Business Process Variants
Abstract. In current dynamic business environment, it has been argued that certain characteristics of ad-hocism in business processes are desirable. Such business processes typical...
Ruopeng Lu, Shazia Wasim Sadiq, Guido Governatori,...
SAC
2010
ACM
15 years 4 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
BMCBI
2006
153views more  BMCBI 2006»
15 years 4 months ago
2DDB - a bioinformatics solution for analysis of quantitative proteomics data
Background: We present 2DDB, a bioinformatics solution for storage, integration and analysis of quantitative proteomics data. As the data complexity and the rate with which it is ...
Lars Malmström, György Marko-Varga, Guni...
TCSV
2008
130views more  TCSV 2008»
15 years 4 months ago
Fast H.264/MPEG-4 AVC Transcoding Using Power-Spectrum Based Rate-Distortion Optimization
Since variable block-size motion compensation (MC) and rate-distortion optimization (RDO) techniques are adopted in H.264/MPEG-4 AVC, modes and motion vectors (MVs) in input stream...
Huifeng Shen, Xiaoyan Sun, Feng Wu