Sciweavers

441 search results - page 73 / 89
» On the Extension of UML with Use Case Maps Concepts
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 2 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
EUROCRYPT
2007
Springer
14 years 1 months ago
Mesh Signatures
sion of an extended abstract to be published in Advances in Cryptology—EUROCRYPT 2007, Springer-Verlag, 2007. Available online from the IACR Cryptology ePrint Archive as Report 2...
Xavier Boyen
ICSOC
2007
Springer
14 years 1 months ago
Let It Flow: Building Mashups with Data Processing Pipelines
Mashups are a new kind of interactive Web application, built out of the composition of two or more existing Web service APIs and data sources. Whereas “pure” mashups are built ...
Biörn Biörnstad, Cesare Pautasso
WACV
2005
IEEE
14 years 1 months ago
Isomap and Nonparametric Models of Image Deformation
Isomap is an exemplar of a set of data driven nonlinear dimensionality reduction techniques that have shown promise for the analysis of images and video. These methods parameteriz...
Richard Souvenir, Robert Pless
ICRA
1998
IEEE
106views Robotics» more  ICRA 1998»
13 years 12 months ago
Learning a Linear Association of Drilling Profiles in Stapedotomy Surgery
The two-level fuzzy-lattice (2L-FL) learning scheme is introduced for application on an intelligent surgical (mechatronic) drill in the stapedotomy surgical procedure in the ear. ...
Vassilis G. Kaburlasos, Vassilios Petridis, Peter ...