Sciweavers

2849 search results - page 559 / 570
» As We Should Have Thought
Sort
View
BPM
2006
Springer
113views Business» more  BPM 2006»
14 years 4 days ago
Process Equivalence: Comparing Two Process Models Based on Observed Behavior
In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service match...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
14 years 4 days ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
14 years 4 days ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
EWSA
2006
Springer
14 years 2 days ago
On the Modular Representation of Architectural Aspects
An architectural aspect is a concern that cuts across architecture ty units and cannot be effectively modularized using the given abstractions of conventional Architecture Descript...
Alessandro Garcia, Christina Chavez, Thaís ...
HHCI
2000
14 years 18 hour ago
Tactile Information Presentation in the Cockpit
This paper describes two aspects of the application of tactile information presentation in the cockpit. The first half of the paper discusses why the tactile channel might be used...
Henricus A. H. C. van Veen, Jan B. F. van Erp