Sciweavers

3318 search results - page 127 / 664
» The Weak Instance Model
Sort
View
SQJ
2010
152views more  SQJ 2010»
13 years 6 months ago
Design pattern evolutions in QVT
One of the main goals of design patterns is to design for change. Many design patterns leave some room for future changes and evolutions. The application of design patterns leads ...
Jing Dong, Yajing Zhao, Yongtao Sun
LICS
2009
IEEE
14 years 2 months ago
On the Computational Complexity of Verifying One-Counter Processes
—One-counter processes are pushdown systems over a singleton stack alphabet (plus a stack-bottom symbol). We study the complexity of two closely related verification problems ov...
Stefan Göller, Richard Mayr, Anthony Widjaja ...
ICCV
1995
IEEE
13 years 11 months ago
Object Pose: Links Between Paraperspective and Perspective
Recently, Dementhon 0 Davis [2] proposed a method for determining the pose of a 3-0 object with respect to a camera from 3-D to 2-0 point correspondences. The method consists of i...
Radu Horaud, Stéphane Christy, Fadi Dornaik...
AOIS
2003
13 years 9 months ago
Towards a More Expressive and Refinable Multiagent System Engineering Methodology
In this paper, we improve and extend the MaSE methodology to bridge the gaps in this methodology. First, we propose an improvement process and, based on this process, we report th...
Shiva Vafadar, Ahmad Abdollahzadeh Barfouroush, Mo...
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
13 years 6 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...