Sciweavers

1419 search results - page 100 / 284
» Notes on Formalizing Context
Sort
View
111
Voted
SICHERHEIT
2008
15 years 2 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
ISICT
2004
15 years 2 months ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang
GRAPHICSINTERFACE
1997
15 years 2 months ago
The Immediate Usability of Graffiti
We present four empirical measures of the immediate usability of Graffiti, a character recognizer for pen-based computers. Since speed is fully controlled by the user, we measured...
I. Scott MacKenzie, Shawn X. Zhang
113
Voted
ATAL
2010
Springer
15 years 28 days ago
Verifying agents with memory is harder than it seemed
ATL+ is a variant of alternating-time temporal logic that does not have the expressive power of full ATL , but still allows for expressing some natural properties of agents. It ha...
Nils Bulling, Wojciech Jamroga
96
Voted
CORR
2000
Springer
104views Education» more  CORR 2000»
15 years 16 days ago
ATLAS: A flexible and extensible architecture for linguistic annotation
We describe a formal model for annotating linguistic artifacts, from which we derive an application programming interface (API) to a tools for manipulating these annotations. The ...
Steven Bird, David Day, John S. Garofolo, John Hen...