Sciweavers

1923 search results - page 183 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
ICPR
2008
IEEE
15 years 4 months ago
Object boundary extraction using Active B-Snake Model
A new deformable model called Active B-Snake Model (ABM) is presented for object boundary extraction. First, an affine-invariant landmark point assignment strategy is proposed to ...
Yue Wang, Eam Khwang Teoh, Zujun Hou, Jian-Gang Wa...
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 1 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
EDOC
2008
IEEE
14 years 12 months ago
A Model Driven Approach to Represent Sequence Diagrams as Free Choice Petri Nets
Model Driven Development (MDD) aims to promote the role of modeling in Software Engineering. Enterprise systems and architectures are often modeled via multiple representations. F...
Mohamed Ariff Ameedeen, Behzad Bordbar
IEEESCC
2008
IEEE
15 years 4 months ago
A Model for Digital Business Ecosystem and Topological Analysis
—This paper presents a novel approach to model a complex evolving system, a Digital Business Ecosystem (DBE) that takes the specific needs of Small and Medium-sized Enterprises ...
Juan Wang, Philippe De Wilde
GPC
2007
Springer
15 years 4 months ago
Heterogeneous Wireless Sensor Network Deployment and Topology Control Based on Irregular Sensor Model
Heterogeneous wireless sensor network (heterogeneous WSN) consists of sensor nodes with different ability, such as different computing power and sensing range. Compared with homoge...
Chun-Hsien Wu, Yeh-Ching Chung