Sciweavers

23630 search results - page 85 / 4726
» Common Information Model
Sort
View
149
Voted
FLAIRS
2000
15 years 5 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
ISW
2005
Springer
15 years 9 months ago
Universally Composable Time-Stamping Schemes with Audit
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan...
135
Voted
AVI
2006
15 years 5 months ago
Input interactions and context component based modelisations: differences and similarities
Since several years, ubiquitous computing and pervasive computing has emerged and, in particular, context-aware computing. Using mobile devices, the context is perpetually evolvin...
Diane Lingrand, Michel Riveill
DAGM
2009
Springer
15 years 10 months ago
Localised Mixture Models in Region-Based Tracking
An important problem in many computer vision tasks is the separation of an object from its background. One common strategy is to estimate appearance models of the object and backgr...
Christian Schmaltz, Bodo Rosenhahn, Thomas Brox, J...
145
Voted
KCAP
2005
ACM
15 years 9 months ago
An ontological approach to the construction of problem-solving models
Our ongoing work aims at defining an ontology-centered approach for building expertise models for the CommonKADS methodology. This approach (which is named "OntoKADS") i...
Sabine Bruaux, Gilles Kassel, Gilles Morel