Sciweavers

823 search results - page 116 / 165
» Model replication: transformations to address model scalabil...
Sort
View
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
15 years 4 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese
RTSS
2003
IEEE
15 years 3 months ago
Scheduling Real-Time Dwells Using Tasks with Synthetic Periods
This paper addresses the problem of scheduling realtime dwells in multi-function phase array radar systems. To keep track of targets, a radar system must meet its timing and energ...
Chi-Sheng Shih, Sathish Gopalakrishnan, Phanindra ...
CANDC
2009
ACM
15 years 4 months ago
Growing and destroying the worth of ideas
This paper presents a novel computational approach to the study of creativity. In particular, it discusses a modeling framework that addresses the worth of ideas ascribed by agent...
Ricardo Sosa, John S. Gero, Kyle Jennings
DEXAW
2005
IEEE
176views Database» more  DEXAW 2005»
15 years 3 months ago
A Data Warehousing Environment to Monitor Metrics in Software Development Processes
Software organizations follow capability models in order to aggregate quality to their processes and products. Process measurement and analysis are key issues, but their implement...
Duncan Dubugras A. Ruiz, Karin Becker, Taisa C. No...
ASWEC
2004
IEEE
15 years 1 months ago
UML Documentation Support for XML Schema
With the proliferation of XML as the lingua franca of internet information exchange, engineering XML documents and maintaining their databases becomes a major challenge. In this c...
Flora Dilys Salim, Rosanne Price, Shonali Krishnas...