Sciweavers

16843 search results - page 3247 / 3369
» On Generalized Authorization Problems
Sort
View
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
CVPR
2006
IEEE
15 years 4 months ago
Multiple Face Model of Hybrid Fourier Feature for Large Face Image Set
The face recognition system based on the only single classifier considering the restricted information can not guarantee the generality and superiority of performances in a real s...
Wonjun Hwang, Gyu-tae Park, Jong Ha Lee, Seok-Cheo...
ESWS
2006
Springer
15 years 4 months ago
WSTO: A Classification-Based Ontology for Managing Trust in Semantic Web Services
The aim of this paper is to provide a general ontology that allows the specification of trust requirements in the Semantic Web Services environment. Both client and Web Service can...
Stefania Galizia
FASE
2006
Springer
15 years 4 months ago
: Designing a Scalable Build Process
Modern software codebases are frequently large, heterogeneous, and constantly evolving. The languages and tools for software construction, including code builds and configuration m...
Jason Hickey, Aleksey Nogin
FQAS
2006
Springer
101views Database» more  FQAS 2006»
15 years 4 months ago
Cooperative Discovery of Interesting Action Rules
Action rules introduced in [12] and extended further to e-action rules [21] have been investigated in [22], [13], [20]. They assume that attributes in a database are divided into t...
Agnieszka Dardzinska, Zbigniew W. Ras
« Prev « First page 3247 / 3369 Last » Next »