Sciweavers

1384 search results - page 189 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
TOSEM
2010
168views more  TOSEM 2010»
14 years 4 months ago
Analysis and applications of timed service protocols
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted tha...
Julien Ponge, Boualem Benatallah, Fabio Casati, Fa...
ISWC
2005
IEEE
15 years 3 months ago
Modeling a Wearable Full-body Motion Capture System
Abstract— This paper describes a feasibility study for a selfcontained, wearable full-body motion capture system based on time-of-flight measurements that provide absolute dista...
Christopher Einsmann, Meghan Quirk, Ben Muzal, Bha...
WSCG
2004
212views more  WSCG 2004»
14 years 11 months ago
Face and Hands Segmentation in Color Images and Initial Matching with a Biomechanical Model
In this paper we describe a robust and efficient procedure to detect skin region with homogeneous color values in monocular indoor images. The mathematical background is a functio...
Jose Maria Buades Rubio, Manuel González Hi...
ASIACRYPT
2009
Springer
15 years 2 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
ASIACRYPT
2008
Springer
14 years 12 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi