Sciweavers

2702 search results - page 113 / 541
» Message from the Editor
Sort
View
AUSAI
2007
Springer
14 years 4 months ago
Tomographic Reconstruction of Images from Noisy Projections - A Preliminary Study
Abstract. Although Computed Tomography (CT) is a mature discipline, the development of techniques that will further reduce radiation dose are still essential. This paper makes step...
A. P. Dalgleish, David L. Dowe, Imants D. Svalbe
ICSM
2003
IEEE
14 years 3 months ago
Reverse Engineering of the Interaction Diagrams from C++ Code
In object oriented programming, the functionalities of a system result from the interactions (message exchanges) among the objects allocated by the system. While designing object ...
Paolo Tonella, Alessandra Potrich
ECOOP
2000
Springer
14 years 2 months ago
Automated Test Case Generation from Dynamic Models
We have recently shown how use cases can be systematically transformed into UML state charts considering all relevant information from a use case specification, including pre- and ...
Peter Fröhlich, Johannes Link
ICDCS
1994
IEEE
14 years 2 months ago
Submission of Transactions from Mobile Workstations in a Cooperative Multidatabase Processing Environment
In a multidatabase environment with mobile computers involved, the nature of computing is such that the user may not wait for the submitted global transaction to complete before d...
L. H. Yeo, Arkady B. Zaslavsky
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
14 years 4 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...