Sciweavers

1384 search results - page 189 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
140
Voted
TOSEM
2010
168views more  TOSEM 2010»
14 years 8 months ago
Analysis and applications of timed service protocols
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted tha...
Julien Ponge, Boualem Benatallah, Fabio Casati, Fa...
ISWC
2005
IEEE
15 years 7 months ago
Modeling a Wearable Full-body Motion Capture System
Abstract— This paper describes a feasibility study for a selfcontained, wearable full-body motion capture system based on time-of-flight measurements that provide absolute dista...
Christopher Einsmann, Meghan Quirk, Ben Muzal, Bha...
WSCG
2004
212views more  WSCG 2004»
15 years 3 months ago
Face and Hands Segmentation in Color Images and Initial Matching with a Biomechanical Model
In this paper we describe a robust and efficient procedure to detect skin region with homogeneous color values in monocular indoor images. The mathematical background is a functio...
Jose Maria Buades Rubio, Manuel González Hi...
ASIACRYPT
2009
Springer
15 years 5 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
ASIACRYPT
2008
Springer
15 years 3 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi