Sciweavers

12289 search results - page 325 / 2458
» computing 2006
Sort
View
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 10 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
WECWIS
2006
IEEE
144views ECommerce» more  WECWIS 2006»
15 years 10 months ago
Evaluation of Adaptive Computing Concepts for Classical ERP Systems and Enterprise Services
— To ensure the operability and reliability of large scale Enterprise Resource Planning Systems (ERP), a peak-load oriented hardware sizing is often used. Better utilization can ...
Martin Wimmer, Valentin Nicolescu, Daniel Gmach, M...
WECWIS
2006
IEEE
87views ECommerce» more  WECWIS 2006»
15 years 10 months ago
SLA Automated Negotiation Manager for Computing Services
Success in today’s marketing arena can often depend on companies embracing effective new technologies and integrating them into their business model. In the computing service su...
Halina Kaminski, Mark Perry
ADG
2006
Springer
177views Mathematics» more  ADG 2006»
15 years 10 months ago
Recognition of Computationally Constructed Loci
Abstract. We propose an algorithm for automated recognition of computationally constructed curves and discuss several aspects of the recognition problem. Recognizing loci means det...
Peter Lebmeir, Jürgen Richter-Gebert
UIST
2006
ACM
15 years 10 months ago
Robust computer vision-based detection of pinching for one and two-handed gesture input
We present a computer vision technique to detect when the user brings their thumb and forefinger together (a pinch gesture) for close-range and relatively controlled viewing circu...
Andrew D. Wilson