Sciweavers

5378 search results - page 799 / 1076
» Base Logics in Argumentation
Sort
View
136
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
AVSS
2005
IEEE
15 years 6 months ago
VidMAP: video monitoring of activity with Prolog
This paper describes the architecture of a visual surveillance system that combines real time computer vision algorithms with logic programming to represent and recognize activiti...
Vinay D. Shet, David Harwood, Larry S. Davis
105
Voted
ICDAR
2005
IEEE
15 years 6 months ago
From Searching to Browsing through Multimodal Documents Linking
Relationships that link static documents discussed during meetings to the corresponding speech transcripts can be of various kinds. The most important ones, thematic links, quotat...
Dalila Mekhaldi, Denis Lalanne, Rolf Ingold
108
Voted
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
15 years 6 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
94
Voted
ISCC
2005
IEEE
15 years 6 months ago
An Optically Controlled Module for Wavelength Conversion Circuits
We report an innovative solely optical architecture to implement the centralized wavelength conversion module of the CWC (Controlled Wavelength Conversion) protocol [1]. The propo...
Georgios I. Papadimitriou, Amalia N. Miliou, Andre...