Sciweavers

813 search results - page 109 / 163
» Pipeline-centric provenance model
Sort
View
SIGSOFT
2005
ACM
14 years 9 months ago
Lightweight object specification with typestates
Previous work has proven typestates to be useful for modeling protocols in object-oriented languages. We build on this work by addressing substitutability of subtypes as well as i...
Kevin Bierhoff, Jonathan Aldrich
ISBI
2008
IEEE
14 years 9 months ago
Visualizing morphogenesis and growth by temporal interpolation of surface-based 3D atlases
Image-based 3D atlases have been proven to be very useful in biological and medical research. They serve as spatial reference systems that enable researchers to integrate experime...
Chavdar Papazov, Vincent J. Dercksen, Hans Lamecke...
CCS
2009
ACM
14 years 9 months ago
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...
CHI
2005
ACM
14 years 9 months ago
From creating virtual gestures to "writing" in sign languages
Sign languages have been proven to be natural languages, as capable of expressing human thoughts and emotions as traditional languages are. The distinct visual and spatial nature ...
Beifang Yi, Frederick C. Harris Jr., Sergiu M. Das...
CHI
2002
ACM
14 years 9 months ago
Cognitive walkthrough for the web
This paper proposes a transformation of the Cognitive Walkthrough (CW), a theory-based usability inspection method that has proven useful in designing applications that support us...
Marilyn Hughes Blackmon, Peter G. Polson, Muneo Ki...