Sciweavers

5227 search results - page 959 / 1046
» Enterprise modeling using class and instance models
Sort
View
LPAR
2007
Springer
14 years 2 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune
SCALESPACE
2007
Springer
14 years 1 months ago
Uniform and Textured Regions Separation in Natural Images Towards MPM Adaptive Denoising
Abstract. Natural images consist of texture, structure and smooth regions and this makes the task of filtering challenging mainly when it aims at edge and texture preservation. In...
Noura Azzabou, Nikos Paragios, Frederic Guichard
TACAS
2007
Springer
131views Algorithms» more  TACAS 2007»
14 years 1 months ago
From Time Petri Nets to Timed Automata: An Untimed Approach
Abstract. Time Petri Nets (TPN) and Timed Automata (TA) are widely-used formalisms for the modeling and analysis of timed systems. A recently-developed approach for the analysis of...
Davide D'Aprile, Susanna Donatelli, Arnaud Sangnie...
IISWC
2006
IEEE
14 years 1 months ago
Performance Cloning: A Technique for Disseminating Proprietary Applications as Benchmarks
Many embedded real world applications are intellectual property, and vendors hesitate to share these proprietary applications with computer architects and designers. This poses a ...
Ajay Joshi, Lieven Eeckhout, Robert H. Bell Jr., L...
ANSS
2005
IEEE
14 years 1 months ago
Performance Preserving Network Downscaling
The Internet is a large, complex, heterogeneous system operating at very high speeds and consisting of a large number of users. Researchers use a suite of tools and techniques in ...
Fragkiskos Papadopoulos, Konstantinos Psounis, Ram...