Sciweavers

687 search results - page 42 / 138
» Specification and Verification of Model Transformations Usin...
Sort
View
107
Voted
CSI
2008
75views more  CSI 2008»
15 years 18 days ago
Identity-based universal designated multi-verifiers signature schemes
An identity-based (ID-based) universal designated verifier signature (ID-UDVS) scheme allows a signature holder to designate a specific verifier of the signature by using a simpli...
Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, D...
VCIP
2000
127views Communications» more  VCIP 2000»
15 years 1 months ago
Three-dimensional shape-adaptive discrete wavelet transforms for efficient object-based video coding
In this paper, we present an object-based coding scheme using three-dimensional shape-adaptive discrete wavelet transforms (SA-DWT). Rather than straightforward extension of 2D SA...
Jizheng Xu, Shipeng Li, Ya-Qin Zhang
107
Voted
BPSC
2009
184views Business» more  BPSC 2009»
15 years 1 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
CAISE
2006
Springer
15 years 4 months ago
Modelling and Verifying of e-Commerce Systems
Static function hierarchies and models of the dynamic behaviour are typically used in e-commerce systems. Issues to be verifies are the completeness and correctness of the static f...
Andreas Speck
100
Voted
CSEE
2000
Springer
15 years 4 months ago
Technology Transfer Issues for Formal Methods of Software Specification
Accurate and complete requirements specifications are crucial for the design and implementation of high-quality software. Unfortunately, the articulation and verification of softw...
Ken Abernethy, John C. Kelly, Ann E. Kelley Sobel,...