Sciweavers

7694 search results - page 1361 / 1539
» An Implementation of an Applicative File System
Sort
View
158
Voted
ICB
2009
Springer
355views Biometrics» more  ICB 2009»
15 years 10 months ago
3D Signatures for Fast 3D Face Recognition
We propose a vector representation (called a 3D signature) for 3D face shape in biometrics applications. Elements of the vector correspond to fixed surface points in a face-centere...
Chris Boehnen, Tanya Peters, Patrick J. Flynn
IFM
2009
Springer
107views Formal Methods» more  IFM 2009»
15 years 10 months ago
Realizability of Choreographies Using Process Algebra Encodings
Abstract. Service-oriented computing has emerged as a new programming paradigm that aims at implementing software applications which can be used through a network via the exchange ...
Gwen Salaün, Tevfik Bultan
APLAS
2009
ACM
15 years 10 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
122
Voted
DOCENG
2009
ACM
15 years 10 months ago
Declarative interfaces for dynamic widgets communications
Widgets are small and focused multimedia applications that can be found on desktop computers, mobile devices or even TV sets. Widgets rely on structured documents to describe thei...
Cyril Concolato, Jean Le Feuvre, Jean-Claude Dufou...
AFRICACRYPT
2010
Springer
15 years 10 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
« Prev « First page 1361 / 1539 Last » Next »