Sciweavers

899 search results - page 111 / 180
» Using Method Engineering for the Construction of Agent-Orien...
Sort
View
CCS
2010
ACM
13 years 5 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
MEMOCODE
2003
IEEE
14 years 2 months ago
Bridging CSP and C++ with Selective Formalism and Executable Specifications
CSP (Communicating Sequential Processes) is a useful algebraic notation for creating a hierarchical behavioural specification for concurrent systems, due to its formal interproces...
William B. Gardner
ISSRE
2002
IEEE
14 years 1 months ago
Fault Contribution Trees for Product Families
Software Fault Tree Analysis (SFTA) provides a structured way to reason about the safety or reliability of a software system. As such, SFTA is widely used in missioncritical appli...
Dingding Lu, Robyn R. Lutz
CVBIA
2005
Springer
14 years 2 months ago
Locally Switching Between Cost Functions in Iterative Non-rigid Registration
In non-rigid image registration problems, it can be difficult to construct a single cost function that adequately captures concepts of similarity for multiple structures, for examp...
William Mullally, Margrit Betke, Carissa Bellardin...
SGP
2007
13 years 11 months ago
Data-dependent MLS for faithful surface approximation
In this paper we present a high-fidelity surface approximation technique that aims at a faithful reconstruction of piecewise-smooth surfaces from a scattered point set. The presen...
Yaron Lipman, Daniel Cohen-Or, David Levin