Sciweavers

448 search results - page 74 / 90
» Shape specification in design using fuzzy logic
Sort
View
CADE
2008
Springer
15 years 10 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
APSCC
2006
IEEE
15 years 1 months ago
A Model-Driven Aspect Framework for Grid Service Development
Service-Oriented Architecture (SOA) plays an important role in the next generation computing models for scientific and commercial applications. But difficulties in the development...
WenJun Li, ChuWei Huang, QiangChao Chen, Hui Bian
TKDE
2011
150views more  TKDE 2011»
14 years 4 months ago
Estimating and Enhancing Real-Time Data Service Delays: Control-Theoretic Approaches
—It is essential to process real-time data service requests such as stock quotes and trade transactions in a timely manner using fresh data, which represent the current real worl...
Kyoung-Don Kang, Yan Zhou, Jisu Oh
96
Voted
WWW
2003
ACM
15 years 10 months ago
Engineering the Presentation Layer for Semantic Web Information Systems
This paper presents a design methodology that deals with the presentation aspects involved in the development of a Semantic Web Information System. The methodology is driven by tw...
Flavius Frasincar, Geert-Jan Houben, Peter Barna, ...
94
Voted
CVPR
2001
IEEE
15 years 11 months ago
A Spherical Eye from Multiple Cameras (Makes Better Models of the World)
This paper describes an imagingsystem that has been designed specifically for the purpose of recovering egomotion and structure from video. The system consists of six cameras in a...
Patrick Baker, Cornelia Fermüller, Yiannis Al...