Sciweavers

1802 search results - page 328 / 361
» Using Declarative Specifications in Business Process Design
Sort
View
ICCSA
2007
Springer
15 years 5 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
DIAL
2006
IEEE
130views Image Analysis» more  DIAL 2006»
15 years 5 months ago
Improving the Quality of Degraded Document Images
It is common for libraries to provide public access to historical and ancient document image collections. It is common for such document images to require specialized processing i...
Ergina Kavallieratou, Efstathios Stamatatos
DSN
2005
IEEE
15 years 4 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
86
Voted
EUROMICRO
2005
IEEE
15 years 4 months ago
Developing Content-Intensive Applications with XML Documents, Document Transformations and Software Components
This paper describes DTC (Documents, Transformations and Components), our approach to the XML-based development of content-intensive applications. According to this approach, the ...
José Luis Sierra, Alfredo Fernández-...
AOSD
2004
ACM
15 years 4 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh