Sciweavers

3971 search results - page 719 / 795
» On the Use of Properties in Java Applications
Sort
View
MUE
2007
IEEE
149views Multimedia» more  MUE 2007»
15 years 10 months ago
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission
Securing multimedia transmission has become a challenging issue due to the popularization of real-time multimedia applications such as video surveillance, satellite communication ...
Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 10 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
W4A
2005
ACM
15 years 10 months ago
Designing learning systems to provide accessible services
The need for providing learners with web-based learning content that match their accessibility needs and preferences, as well as providing ways to match learning content to userā€...
Pythagoras Karampiperis, Demetrios G. Sampson
CIKM
2005
Springer
15 years 10 months ago
Opportunity map: a visualization framework for fast identification of actionable knowledge
Data mining techniques frequently find a large number of patterns or rules, which make it very difficult for a human analyst to interpret the results and to find the truly interes...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Weimin Xia...
FM
2005
Springer
98views Formal Methods» more  FM 2005»
15 years 10 months ago
Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern
The Mondex Electronic Purse system [18] is an outstanding example of formal refinement techniques applied to a genuine industrial scale application, and notably, was the first ve...
Richard Banach, Michael Poppleton, Czeslaw Jeske, ...