Sciweavers

2055 search results - page 141 / 411
» Generic Model Refactorings
Sort
View
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
15 years 8 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
EKAW
2004
Springer
15 years 7 months ago
Knowledge Formulation for AI Planning
Abstract. In this paper we present an overview of the principle components of GIPO, an environment to support knowledge acquisition for AI Planning. GIPO assists in the knowledge f...
T. L. McCluskey, Ron M. Simpson
DEXAW
2003
IEEE
110views Database» more  DEXAW 2003»
15 years 7 months ago
Methodology and Tools to Support Storytelling in Cultural Heritage Forums
Storytelling is a method by which members of a community communicate, learn and build identity. In the CIPHER project we aim to provide customisable tools for the sharing of stori...
Trevor D. Collins, Paul Mulholland, David Bradbury...
ICVS
2003
Springer
15 years 7 months ago
Automatic Mapping of Settlement Areas Using a Knowledge-Based Image Interpretation System
Abstract. We introduce the knowledge-based image interpretation system GeoAIDA and give examples for an image operator, extracting trees from aerial imagery. Moreover we present a ...
Bernd-Michael Straub, Markus Gerke, Martin Pahl
IH
2001
Springer
15 years 6 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn