Sciweavers

631 search results - page 33 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
WETICE
1999
IEEE
15 years 5 months ago
Active Hypertext for Distributed Web Applications
The prevailing architecture for web-based applications relies on HTML, HTTP and loosely integrated functional elements, propagating a strong distinction between client and server....
Eckhart Köppen, Gustaf Neumann
KI
2008
Springer
15 years 1 months ago
Towards a Mapping from ERDF(S) to Take Vocabulary
This paper presents a mapping solution from ERDF(S) to Take vocabulary. The work is related to an investigation of integrating ERDF Derivation Rules into Take inference engine. Som...
Ion-Mircea Diaconescu, Adrian Giurca, Gerd Wagner,...
ROBOTICA
2002
72views more  ROBOTICA 2002»
15 years 1 months ago
The Weston wheelchair mounted assistive robot - the design story
Robotic technology can be used in several ways to benefit people with disabilities. This paper describes the mounting of a robotic arm to a powered wheelchair to assist disabled u...
Michael Hillman, Karen Hagan, Sean Hagan, Jill Jep...
ESORICS
2009
Springer
15 years 8 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
ICIAP
2007
ACM
15 years 7 months ago
Score-level fusion of fingerprint and face matchers for personal verification under "stress" conditions
Fusion of multiple face and fingerprint matchers based on different biometrics for personal authentication has been investigated in the last years. However, the performance achiev...
Gian Luca Marcialis, Fabio Roli