Sciweavers

40 search results - page 4 / 8
» informaticalt 2010
Sort
View
INFORMATICALT
2010
131views more  INFORMATICALT 2010»
13 years 8 months ago
Extended Software Architecture Based on Security Patterns
One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In...
Dusan Savic, Dejan Simic, Sinisa Vlajic
INFORMATICALT
2010
116views more  INFORMATICALT 2010»
13 years 8 months ago
An Approach to Formalize Metainformation of Software Localizable Resources
Software localization is one of important tasks to insure a successful computer user experience. The paper discusses how localization of the software dialog text can be accelerated...
Valentina Dagiene, Tatjana Jevsikova
INFORMATICALT
2010
70views more  INFORMATICALT 2010»
13 years 8 months ago
Treatment of Over-Saturated Protein Spots in Two-Dimensional Electrophoresis Gel Images
The paper addresses the over-saturated protein spot detection and extraction problem in two-dimensional electrophoresis gel images. The effective technique for detection and recons...
Arturas Serackis, Dalius Navakauskas
INFORMATICALT
2010
102views more  INFORMATICALT 2010»
13 years 6 months ago
An Computation-Efficient Generalized Group-Oriented Cryptosystem
A Group-Oriented Cryptosystem (GOC) allows a sender to encrypt a message sent to a group of users so only the specified sets of users in that group can cooperatively decrypt the me...
Ting-Yi Chang
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 6 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin