Sciweavers

2562 search results - page 415 / 513
» The Use of B2B Process Standards: A Case Study
Sort
View
ICPPW
2009
IEEE
15 years 4 months ago
SenSORCER: A Framework for Managing Sensor-Federated Networks
—Despite many technology advances, the limited computing power of sensors encumber them from taking part in service-oriented architectures. In recent years, the sensornetworking ...
Sujit Bhosale, Michael W. Sobolewski
ESEC
1997
Springer
15 years 1 months ago
Cryptographic Verification of Test Coverage Claims
The market for software components is growing, driven on the "demand side" by the need for rapid deployment of highly functional products, and on the "supply side&q...
Premkumar T. Devanbu, Stuart G. Stubblebine
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
15 years 10 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
ICDE
2007
IEEE
211views Database» more  ICDE 2007»
15 years 4 months ago
Document Representation and Dimension Reduction for Text Clustering
Increasingly large text datasets and the high dimensionality associated with natural language create a great challenge in text mining. In this research, a systematic study is cond...
M. Mahdi Shafiei, Singer Wang, Roger Zhang, Evange...
PATMOS
2007
Springer
15 years 4 months ago
Optimization for Real-Time Systems with Non-convex Power Versus Speed Models
Abstract. Until now, the great majority of research in low-power systems has assumed a convex power model. However, recently, due to the confluence of emerging technological and ar...
Ani Nahapetian, Foad Dabiri, Miodrag Potkonjak, Ma...