Sciweavers

2703 search results - page 506 / 541
» Learning operational requirements from goal models
Sort
View
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 9 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
BMCBI
2008
147views more  BMCBI 2008»
13 years 9 months ago
Transmembrane helix prediction using amino acid property features and latent semantic analysis
Background: Prediction of transmembrane (TM) helices by statistical methods suffers from lack of sufficient training data. Current best methods use hundreds or even thousands of f...
Madhavi Ganapathiraju, Narayanas Balakrishnan, Raj...
VR
2011
IEEE
309views Virtual Reality» more  VR 2011»
13 years 21 days ago
Two-handed tangible interaction techniques for composing augmented blocks
Abstract Modeling tools typically have their own interaction methods for combining virtual objects. For realistic composition in 3D space, many researchers from the fields of virt...
Hyeongmook Lee, Mark Billinghurst, Woontack Woo
CLUSTER
2003
IEEE
14 years 2 months ago
Coordinated Checkpoint versus Message Log for Fault Tolerant MPI
— Large Clusters, high availability clusters and Grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programmin...
Aurelien Bouteiller, Pierre Lemarinier, Gér...
ECCV
2006
Springer
14 years 21 days ago
Accurate Measurement of Cartilage Morphology Using a 3D Laser Scanner
We describe a method to accurately assess articular cartilage morphology using the three-dimensional laser scanning technology. Traditional methods to obtain ground truth for valid...
Nhon H. Trinh, Jonathan Lester, Braden C. Fleming,...