Sciweavers

2483 search results - page 374 / 497
» A design framework to model retinas
Sort
View
CCS
2007
ACM
15 years 4 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
15 years 3 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
ICDM
2005
IEEE
148views Data Mining» more  ICDM 2005»
15 years 3 months ago
Hot Item Mining and Summarization from Multiple Auction Web Sites
Online auction Web sites are fast changing, highly dynamic, and complex as they involve tremendous sellers and potential buyers, as well as a huge amount of items listed for biddi...
Tak-Lam Wong, Wai Lam
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
15 years 3 months ago
Implementing Web Service Protocols in SOA: WS-Coordination and WS-BusinessActivity
Web Service protocol standards should be unambiguous and provide a complete description of the allowed behavior of the protocols’ participants. Implementation of such protocols ...
Friedrich H. Vogt, Simon Zambrovski, Boris Gruschk...
CBSE
2004
Springer
15 years 3 months ago
CB-SPE Tool: Putting Component-Based Performance Engineering into Practice
A crucial issue in the design of Component-Based (CB) applications is the ability to early guarantee that the system under development will satisfy its Quality of Service requireme...
Antonia Bertolino, Raffaela Mirandola