Sciweavers

5525 search results - page 987 / 1105
» Verification of Model Transformations
Sort
View
TCC
2007
Springer
96views Cryptology» more  TCC 2007»
15 years 9 months ago
Securely Obfuscating Re-encryption
Abstract. We present the first positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known negative impossibil...
Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, V...
3DPVT
2006
IEEE
215views Visualization» more  3DPVT 2006»
15 years 9 months ago
Region-Based Motion Analysis and 3D Reconstruction for a Translational Video Sequence
This paper presents a hybrid 1D motion estimation algorithm which combines pixel-based and region-based approaches that can give depth images from translational video sequences wi...
Xiaodong Huang, Eric Dubois
ICAC
2006
IEEE
15 years 9 months ago
Utility-aware Resource Allocation in an Event Processing System
— Event processing systems link event producers and consumers in a flexible manner, by supporting multiple communication patterns and powerful message transformations. Such syst...
Sumeer Bhola, Mark Astley, Robert Saccone, Michael...
ICDE
2006
IEEE
208views Database» more  ICDE 2006»
15 years 9 months ago
Approximate Video Search Based on Spatio-Temporal Information of Video Objects
The spatio-temporal information of a video object is important for content-based video retrieval. In this paper the spatio-temporal information of a video object, such as the velo...
Chia-Han Lin, Arbee L. P. Chen
ICMB
2006
IEEE
132views Business» more  ICMB 2006»
15 years 9 months ago
Generating User Interfaces from CDISC ODM for Mobile Devices
Clinical studies are often conducted as multi-centered studies involving participants at different locations. Thus it becomes obvious that using mobile platforms and remote data e...
Guido M. de Melo, Jürgen Nagler-Ihlein, Micha...