Sciweavers

1641 search results - page 265 / 329
» Subject Composition by Roles
Sort
View
114
Voted
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 6 months ago
Characterizing Ideal Weighted Threshold Secret Sharing
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user is assigned a positive w...
Amos Beimel, Tamir Tassa, Enav Weinreb
VLSM
2005
Springer
15 years 6 months ago
Incorporating Rigid Structures in Non-rigid Registration Using Triangular B-Splines
For non-rigid registration, the objects in medical images are usually treated as a single deformable body with homogeneous stiffness distribution. However, this assumption is inval...
Kexiang Wang, Ying He 0001, Hong Qin
139
Voted
CSCW
2004
ACM
15 years 6 months ago
Six degrees of jonathan grudin: a social network analysis of the evolution and impact of CSCW research
In this paper, we describe the evolution and impact of computersupported cooperative work (CSCW) research through social network analysis of coauthorship data. A network of author...
Daniel B. Horn, Thomas A. Finholt, Jeremy P. Birnh...
EMSOFT
2004
Springer
15 years 6 months ago
Reactive process networks
Data flow process networks are a good model of computation for streaming multimedia applications incorporating audio, video and/or graphics streams. Process networks are concurre...
Marc Geilen, Twan Basten
117
Voted
ICSOC
2004
Springer
15 years 6 months ago
Associating assertions with business processes and monitoring their execution
Business processes that span organizational borders describe the interaction between multiple parties working towards a common objective. They also express business rules that gov...
Alexander Lazovik, Marco Aiello, Mike P. Papazoglo...