Sciweavers

503 search results - page 99 / 101
» A Metamodel for Generating Performance Models from UML Desig...
Sort
View
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 10 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
APN
2010
Springer
13 years 12 months ago
Wendy: A Tool to Synthesize Partners for Services
Service-oriented computing proposes services as building blocks which can be composed to complex systems. To reason about the correctness of a service, its communication protocol n...
Niels Lohmann, Daniela Weinberg
CVPR
2011
IEEE
12 years 10 months ago
Learning-based Hypothesis Fusion for Robust Catheter Tracking in 2D X-ray Fluoroscopy
Catheter tracking has become more and more important in recent interventional applications. It provides real time guidance for the physicians and can be used as motion compensated...
Wen Wu, Terrence Chen, Adrian Barbu, Peng Wang, No...
GIS
2006
ACM
14 years 8 months ago
Optimization of multiple continuous queries over streaming satellite data
Remotely sensed data, in particular satellite imagery, play many important roles in environmental applications and models. In particular applications that study (rapid) changes in...
Quinn Hart, Michael Gertz
BMCBI
2005
246views more  BMCBI 2005»
13 years 7 months ago
ParPEST: a pipeline for EST data analysis based on parallel computing
Background: Expressed Sequence Tags (ESTs) are short and error-prone DNA sequences generated from the 5' and 3' ends of randomly selected cDNA clones. They provide an im...
Nunzio D'Agostino, Mario Aversano, Maria Luisa Chi...