Sciweavers

1620 search results - page 243 / 324
» Use Case Level Pointcuts
Sort
View
EDBT
1998
ACM
131views Database» more  EDBT 1998»
15 years 3 months ago
Processing Complex Similarity Queries with Distance-Based Access Methods
Efficient evaluation of similarity queries is one of the basic requirements for advanced multimedia applications. In this paper, we consider the relevant case where complex similar...
Paolo Ciaccia, Marco Patella, Pavel Zezula
IUI
1997
ACM
15 years 3 months ago
Local Plan Recognition in Direct Manipulation Interfaces
Plan recognition in direct manipulation interfaces must deal with the problem that the information obtained is of low quality with respect to the plan recognition task. There are ...
Annika Wærn
HYBRID
1994
Springer
15 years 3 months ago
Symbolic Controller Synthesis for Discrete and Timed Systems
This paper presents algorithms for the symbolic synthesis of discrete and real-time controllers. At the semantic level the controller is synthesized by nding a winning strategy for...
Eugene Asarin, Oded Maler, Amir Pnueli
ASIACRYPT
2007
Springer
15 years 3 months ago
On Tweaking Luby-Rackoff Blockciphers
Abstract. Tweakable blockciphers, first formalized by Liskov, Rivest, and Wagner [13], are blockciphers with an additional input, the tweak, which allows for variability. An open p...
David Goldenberg, Susan Hohenberger, Moses Liskov,...
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 3 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge