Sciweavers

1156 search results - page 67 / 232
» Compositional Methods for Information-Hiding
Sort
View
JWSR
2007
83views more  JWSR 2007»
13 years 7 months ago
Web Service Discovery and Composition for Virtual Enterprises
: One main characteristic of virtual enterprises are short-term collaborations between business partners to provide efficient and individualized services to customers. The MOVE pro...
Jürgen Dorn, Peter Hrastnik, Albert Rainer
WWW
2004
ACM
14 years 8 months ago
Compositional knowledge management for medical services on semantic web
The vision of the Semantic Web is to reduce manual discovery and usage of Web resources (documents and services) and to allow software agents to automatically identify these Web r...
Yugyung Lee, Chintan Patel, Soon Ae Chun, James Ge...
GPCE
2007
Springer
14 years 1 months ago
Safe composition of product lines
Programs of a software product line can be synthesized by composing modules that implement features. Besides high-level domain constraints that govern the compatibility of feature...
Sahil Thaker, Don S. Batory, David Kitchin, Willia...
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
14 years 1 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
CCS
2003
ACM
14 years 28 days ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...