Sciweavers

7681 search results - page 1364 / 1537
» Typed Membrane Systems
Sort
View
IEEESCC
2007
IEEE
15 years 10 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
ISBI
2007
IEEE
15 years 10 months ago
Automated Grading of Prostate Cancer Using Architectural and Textural Image Features
The current method of grading prostate cancer on histology uses the Gleason system, which describes five increasingly malignant stages of cancer according to qualitative analysis...
Scott Doyle, Mark Hwang, Kinsuk Shah, Anant Madabh...
AIRWEB
2007
Springer
15 years 10 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
CSEE
2007
Springer
15 years 10 months ago
Towards a European Master Programme on Global Software Engineering
This paper presents a European Master programme on Global Software Engineering (SE), being put forward by four leading institutions from Sweden, UK, Netherlands and Italy. The Glo...
Patricia Lago, Henry Muccini, Ljerka Beus-Dukic, I...
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 10 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
« Prev « First page 1364 / 1537 Last » Next »