Sciweavers

1444 search results - page 209 / 289
» The end of users
Sort
View
99
Voted
IJBC
2006
93views more  IJBC 2006»
15 years 18 days ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
92
Voted
IJCOMSYS
2006
99views more  IJCOMSYS 2006»
15 years 18 days ago
Distributed policy processing in active-service based infrastructures
More and more applications in the Internet are requiring an intelligent service infrastructure to provide customized services. In this paper, we present an infrastructure, which c...
Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao
90
Voted
IVC
2008
74views more  IVC 2008»
15 years 18 days ago
Log-polar mapping template design: From task-level requirements to geometry parameters
The best parameters defining the geometry of a visual sensor generally depend on the particular visual task the sensor is intended to be used in. However, translating task require...
V. Javier Traver, Filiberto Pla
IS
2006
15 years 18 days ago
A proof markup language for Semantic Web services
The Semantic Web is being designed to enable automated reasoners to be used as core components in a wide variety of Web applications and services. In order for a client to accept ...
Paulo Pinheiro da Silva, Deborah L. McGuinness, Ri...
CSI
2007
86views more  CSI 2007»
15 years 17 days ago
Using UML to model relational database operations
The Unified Modeling Language (UML) is being used as the de-facto standard in the software industry. With the adoption of UML 2.0, the new enhancements allow this version to desc...
Eunjee Song, Shuxin Yin, Indrakshi Ray