Sciweavers

3623 search results - page 648 / 725
» Functionally Modeled User Interfaces
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 3 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
130
Voted
EDOC
2008
IEEE
15 years 9 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
126
Voted
WEBI
2007
Springer
15 years 8 months ago
Detection of Web Subsites: Concepts, Algorithms, and Evaluation Issues
Web sites are often organized into several regions, each dedicated to a specific topic or serving a particular function. From a user’s perspective, these regions typically form ...
Eduarda Mendes Rodrigues, Natasa Milic-Frayling, B...
ISCC
2002
IEEE
139views Communications» more  ISCC 2002»
15 years 7 months ago
BWIG: Bluetooth Web Internet Gateway
Bluetooth is a new wireless standard for low cost, low power, local radio communications. This technology is designed to be small enough to fit inside any electronic device, hence...
Nicolas Rouhana, Eric Horlait
109
Voted
CAISE
1997
Springer
15 years 6 months ago
OO-METHOD: An OO Software Production Environment Combining Conventional and Formal Methods
OO-Method is an OO Methodology that blends the use of formal specification systems with conventional OO methodologies based on practice. In contrast to other approaches in this fi...
Oscar Pastor, Emilio Insfrán, Vicente Pelec...