Sciweavers

2421 search results - page 408 / 485
» Message from the Co-Chairs
Sort
View
ICSE
2009
IEEE-ACM
14 years 10 months ago
Analyzing critical process models through behavior model synthesis
Process models capture tasks performed by agents together with their control flow. Building and analyzing such models is important but difficult in certain areas such as safety-cr...
Christophe Damas, Bernard Lambeau, Francois Roucou...
WWW
2006
ACM
14 years 9 months ago
Generation of multimedia TV news contents for WWW
In this paper, we present a system we have developed for automatic TV News video indexing that successfully combines results from the fields of speaker verification, acoustic anal...
Hsin-Chia Fu, Yeong-Yuh Xu, C. L. Tseng
WWW
2006
ACM
14 years 9 months ago
WAP5: black-box performance debugging for wide-area systems
Wide-area distributed applications are challenging to debug, optimize, and maintain. We present Wide-Area Project 5 (WAP5), which aims to make these tasks easier by exposing the c...
Patrick Reynolds, Janet L. Wiener, Jeffrey C. Mogu...
WWW
2005
ACM
14 years 9 months ago
WebRogue: virtual presence in web sites
WebRogue is an application for virtual presence over the Web. It provides the Web Browser with a chat subwindow that allows users connected to the same Web site to meet, share opi...
Alessandro Soro, Ivan Marcialis, Davide Carboni, G...
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
14 years 9 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...