Sciweavers

CORR
2004
Springer
113views Education» more  CORR 2004»
13 years 4 months ago
Pattern Reification as the Basis for Description-Driven Systems
One of the main factors driving object-oriented software development for information systems is the requirement for systems to be tolerant to change. To address this issue in desig...
Florida Estrella, Zsolt Kovacs, Jean-Marie Le Goff...
CORR
2004
Springer
87views Education» more  CORR 2004»
13 years 4 months ago
Educational Content Management - A Cellular Approach
Michael Engelhardt, Arne Hildebrand, Andreas K&aac...
CORR
2004
Springer
223views Education» more  CORR 2004»
13 years 4 months ago
Better Foreground Segmentation Through Graph Cuts
For many tracking and surveillance applications, background subtraction provides an effective means of segmenting objects moving in front of a static background. Researchers have ...
Nicholas R. Howe, Alexandra Deschamps
CORR
2004
Springer
97views Education» more  CORR 2004»
13 years 4 months ago
Planning for Directory Services in Public Key Infrastructures
: In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how t...
Vangelis Karatsiolis, Marcus Lippert, Alexander Wi...
CORR
2004
Springer
71views Education» more  CORR 2004»
13 years 4 months ago
Towards a Flexible Intra-Trustcenter Management Protocol
Vangelis Karatsiolis, Marcus Lippert, Alexander Wi...
CORR
2004
Springer
79views Education» more  CORR 2004»
13 years 4 months ago
An Evaluated Certification Services System for the German National Root CA
National Root CAs enable legally binding E
Evangelos G. Karatsiolis, Marcus Lippert, Alexande...
CORR
2004
Springer
107views Education» more  CORR 2004»
13 years 4 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
CORR
2004
Springer
88views Education» more  CORR 2004»
13 years 4 months ago
A Trace Logic for Local Security Properties
Ricardo Corin, Antonio Durante, Sandro Etalle, Pie...
CORR
2004
Springer
107views Education» more  CORR 2004»
13 years 4 months ago
A Directed Threshold - Signature Scheme
Sunder Lal, Manoj Kumar