Sciweavers

5525 search results - page 906 / 1105
» Verification of Model Transformations
Sort
View
ATAL
2005
Springer
15 years 9 months ago
Trust evaluation through relationship analysis
Current mechanisms for evaluating the trustworthiness of an agent within an electronic marketplace depend either on using a history of interactions or on recommendations from othe...
Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater...
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 9 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
SAC
2004
ACM
15 years 9 months ago
On using collection for aggregation and association relationships in XML object-relational storage
XML data can be stored in different databases including ObjectRelational Database (ORDB). Using ORDB, we get the benefit of the relational maturity and the richness of OO modeling...
Eric Pardede, J. Wenny Rahayu, David Taniar
ICSM
2003
IEEE
15 years 9 months ago
Software Architecture Recovery based on Pattern Matching
This paper is a summary of the author’s thesis that presents a model and an environment for recovering the high level design of legacy software systems based on user defined ar...
Kamran Sartipi
PG
2003
IEEE
15 years 9 months ago
Illustration Watermarks for Vector Graphics
Digital watermarking is a technique for embedding information into data, such as images, 3D models, or audio files, such that some properties (i. e., security, imperceptibility, ...
Henry Sonnet, Tobias Isenberg, Jana Dittmann, Thom...