Sciweavers

2125 search results - page 196 / 425
» Points with Type-2 Operations
Sort
View
137
Voted
EPEW
2005
Springer
15 years 9 months ago
Choreographing Security and Performance Analysis for Web Services
We describe a UML-based method which supports model-driven development of service-oriented architectures including those used in Web services. Analysable content is extracted from ...
Stephen Gilmore, Valentin Haenel, Leïla Kloul...
ESAS
2005
Springer
15 years 9 months ago
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices
Abstract. One of the most frequent operations in modern cryptosystems is a multi-scalar multiplication with two scalars. Common methods to compute it are the Shamir method and the ...
Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi
ESOP
2005
Springer
15 years 9 months ago
Towards a Type System for Analyzing JavaScript Programs
JavaScript is a popular language for client-side web scripting. It has a dubious reputation among programmers for two reasons. First, many JavaScript programs are written against a...
Peter Thiemann
ICCSA
2005
Springer
15 years 9 months ago
Mesh Generation for Symmetrical Geometries
Symmetries are not only fascinating, but they can also be exploited when designing numerical algorithms and data structures for scientific engineering problems in symmetrical doma...
Krister Åhlander
IDEAL
2005
Springer
15 years 9 months ago
Evolving Neural Networks for the Classification of Malignancy Associated Changes
Malignancy Associated Changes are subtle changes to the nuclear texture of visually normal cells in the vicinity of a cancerous or precancerous lesion. We describe a classifier for...
Jennifer Hallinan