Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Preface; Contents; About the Editors; Part ISoftware Engineering; 1 Non-functional Property Aware Brokerage Approach for Cloud Service Discovery; Abstract; 1...Introduction; 2...Related Work; 3...Proposed Solution; 3.1 The Proposed Meta-Model; 3.2 Description of the Framework; 3.3 Service Discovery Algorithm; 4...Illustration with Example; 5...Conclusion; References; 2 A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration; Abstract; 1...Introduction; 2...Background; 2.1 Discrete Wavelet Transform; 3...Proposed Scheme; 3.1 Watermark Preparation

3.1.1 Block Mapping Address Generation Algorithm3.2 Watermark Generation; 3.3 Watermark Embedding; 3.4 Watermark Extraction: Tamper Detection, Localization, and Restoration; 4...Experimental Results; 4.1 Imperceptibility of Watermark; 4.2 Payload; 4.3 Performance Against Tampering; 4.4 Comparative Study; 5...Conclusion; References; 3 Service Insurance: A New Approach in Cloud Brokerage; Abstract; 1...Introduction; 2...Related Work; 3...Proposed Work; 3.1 Component Description of the Framework; 3.2 Workflow of the Framework; 4...Risk Analysis; 4.1 Causes Behind Risk Identification

4.2 Service Life Cycle and Risks4.3 Service Governance and Related Risks; 4.4 Service Development and Risks; 4.5 Service Release and Communication and Related Risks; 4.6 Service Offering and Risks; 5...Risk Modeling; 6...Conclusion; References; 4 Using Semiformal and Formal Methods in Software Design: An Integrated Approach for Intelligent Learning Management System; Abstract; 1...Introduction; 2...Related Work; 3...Proposed Framework; 4...The Case Study; 5...Requirement Specification; 6...Design Model; 6.1 Consistency Rules; 6.2 Use Case Diagram; 6.3 Activity Diagram; 6.4 Class Diagram; 6.5 Sequence Diagram

6.6 VDM-SL Specification7...Design Verification; 7.1 Verifying Continuity; 7.2 Verifying Requirement; 8...Conclusions; References; 5 A Lightweight Implementation of Obstruction-Free Software Transactional Memory; Abstract; 1...Introduction; 2...Software Transactional Memory and Progress Condition; 3...Scope of the Work; 4...Simulation of the Proposed Lightweight OFTM; 4.1 Definitions; 4.2 Assumptions; 4.3 Algorithm; 5...Performance Evaluation by Experiments; 5.1 Plan for Experimental Verification; 5.2 Experimental Results; 6...Concluding Remarks; References; Part IICryptography

6 Multiplicative Polynomial Inverse Over GF(73): Crisis of EEA and Its SolutionAbstract; 1...Introduction; 2...EEA and Multiplicative Inverse in GF(28) and GF(73); 2.1 The EEA with Examples and Its Computational Algorithm; 2.1.1 Computational Algorithm to Find S and T; 2.2 Successful Application of EEA to Find Multiplicative Inverse Over GF(28); 2.3 Successful Application of EEA to Find Multiplicative Inverse Over GF(73); 2.4 Unsuccessful Application of EEA to Find Multiplicative Inverse Over GF(73); 2.5 Comparative Study of Success and Failures of EEA Over GF(28) and GF(73)

Browse Subjects

Show more subjects...

Statistics

from
to
Export