Sciweavers

1358 search results - page 241 / 272
» Supporting Reflection in Informal Learning
Sort
View
ISW
2007
Springer
15 years 6 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
DIAL
2006
IEEE
185views Image Analysis» more  DIAL 2006»
15 years 5 months ago
Automatic Content-based Indexing of Digital Documents through Intelligent Processing Techniques
The availability of large, heterogeneous repositories of electronic documents is increasing rapidly, and the need for flexible, sophisticated document manipulation tools is growi...
Floriana Esposito, Stefano Ferilli, Teresa Maria A...
QSIC
2006
IEEE
15 years 5 months ago
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
MIR
2006
ACM
195views Multimedia» more  MIR 2006»
15 years 5 months ago
Automatically selecting shots for action movie trailers
Movie trailers, or previews, are an important method of advertising movies. They are extensively shown before movies in cinemas, as well as on television and increasingly, over th...
Alan F. Smeaton, Bart Lehane, Noel E. O'Connor, Co...
ICPADS
2005
IEEE
15 years 5 months ago
Distributed Spanning Tree Algorithms for Large Scale Traversals
— The Distributed Spanning Tree (DST) is an overlay structure designed to be scalable. It supports the growth from small scale to large scale. The DST is a tree without bottlenec...
Sylvain Dahan