Sciweavers

2015 search results - page 115 / 403
» Hidden Software Capabilities
Sort
View
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
CVPR
2012
IEEE
11 years 11 months ago
Learning latent temporal structure for complex event detection
In this paper, we tackle the problem of understanding the temporal structure of complex events in highly varying videos obtained from the Internet. Towards this goal, we utilize a...
Kevin Tang, Fei-Fei Li, Daphne Koller
ICSE
2007
IEEE-ACM
14 years 9 months ago
Automated Generation of Context-Aware Tests
The incorporation of context-awareness capabilities into pervasive applications allows them to leverage contextual information to provide additional services while maintaining an ...
Zhimin Wang, Sebastian G. Elbaum, David S. Rosenbl...
ICWS
2009
IEEE
14 years 6 months ago
A Governance Model for SOA
Currently, business requirements for rapid operational efficiency, customer responsiveness as well as rapid adaptability are driving the need for ever increasing communication and...
Pierre de Leusse, Theodosis Dimitrakos, David Bros...
ICSEA
2009
IEEE
14 years 4 months ago
Rule-Based Service Modeling
— In the context of service-oriented computing, services provide the capabilities necessary to support the business, especially its processes. Within the service modeling process...
Michael Gebhart, Sebastian Abeck