Sciweavers

813 search results - page 36 / 163
» Pipeline-centric provenance model
Sort
View
AVBPA
2001
Springer
117views Biometrics» more  AVBPA 2001»
14 years 7 days ago
Hand Recognition Using Implicit Polynomials and Geometric Features
Person identification and verification using biometric methods is getting more and more important in today’s information society; resulting in increased utilization of systems th...
Cenker Öden, Aytül Erçil, Vedat T...
CCS
1999
ACM
14 years 7 hour ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
CCS
1997
ACM
13 years 12 months ago
The Security of Static Typing with Dynamic Linking
Dynamic linking is a requirement for portable executable content. Executable content cannot know, ahead of time, where it is going to be executed, nor know the proper operating sy...
Drew Dean
ICDT
1997
ACM
133views Database» more  ICDT 1997»
13 years 12 months ago
A Formal Foundation for Distributed Workflow Execution Based on State Charts
This paper provides a formal foundation for distributed workfiow executions. The state chart formalism is adapted to the needs of a workflow model in order to establish a basis for...
Dirk Wodtke, Gerhard Weikum
DAC
1993
ACM
13 years 11 months ago
A Negative Reinforcement Method for PGA Routing
We present an efficient and effective method for the detailed routing of symmetrical or sea-of-gates FPGA architectures. Instead of breaking the problem into 2-terminal net collec...
Forbes D. Lewis, Wang Chia-Chi Pong