Sciweavers

1462 search results - page 254 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
PADL
2001
Springer
15 years 4 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
CVPR
2011
IEEE
14 years 3 months ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
15 years 5 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
DGO
2009
175views Education» more  DGO 2009»
15 years 26 days ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
HIKM
2006
ACM
15 years 5 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...