Sciweavers

1722 search results - page 329 / 345
» Ontology Formalism Transformation
Sort
View
EUROCRYPT
2004
Springer
14 years 1 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
RTAS
1999
IEEE
13 years 12 months ago
Timing Constraint Remapping to Avoid Time Discontinuities in Distributed Real-Time Systems
In this paper we propose a dynamic constraint transformation technique for ensuring timing requirements in a distributed real-time system possessing periodically synchronized dist...
Minsoo Ryu, Jungkeun Park, Seongsoo Hong
ACISP
2006
Springer
13 years 11 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
ACMICEC
2008
ACM
240views ECommerce» more  ACMICEC 2008»
13 years 9 months ago
Document-oriented heterogeneous business process integration through collaborative e-marketplace
In this paper, we studied the semantic consistency maintenance issue between heterogeneous contexts, that is, how a firm business process of one e-marketplace can be transformed t...
Jingzhi Guo, Zhuo Hu, Chi-Kit Chan, Yufeng Luo, Ch...
MBEES
2007
13 years 9 months ago
Generierung von UML-Modellen aus formalisierten Anwendungsfallbeschreibungen
Abstract: In diesem Kurzbeitrag zeigen wir, wie textuelle Anwendungsfallbeschreibungen werkzeuggest¨utzt in UML-Aktivit¨atsdiagramme ¨uberf¨uhrt werden k¨onnen. Mit Hilfe eine...
Mario Friske, Bernd-Holger Schlingloff