Sciweavers

503 search results - page 14 / 101
» Authenticity by tagging and typing
Sort
View
DSONLINE
2000
60views more  DSONLINE 2000»
13 years 7 months ago
Ubiquitous Electronic Tagging
The automatic identification industry is growing rapidly. Tags occur in many forms and appear on everything from luggage at the airport, to dogs, trains and fresh fruit. As with m...
Roy Want, Daniel M. Russell
ICNC
2005
Springer
14 years 1 months ago
Typing Aberrance in Signal Transduction
We have developed a calculus, called Ipi, for describing the aberrance in biological models. Our approach extends the traditional pi calculus to handle aberrant process in the sign...
Min Zhang, Guoqiang Li, Yuxi Fu, Zhizhou Zhang, Li...
PLDI
1998
ACM
13 years 11 months ago
Eliminating Array Bound Checking Through Dependent Types
We present a type-based approach to eliminating array bound checking and list tag checking by conservatively extending Standard ML with a restricted form of dependent types. This ...
Hongwei Xi, Frank Pfenning
PADO
2001
Springer
13 years 12 months ago
Tag Elimination and Jones-Optimality
Tag elimination is a program transformation for removing unnecessary tagging and untagging operations from automatically generated programs. Tag elimination was recently proposed a...
Walid Taha, Henning Makholm, John Hughes
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
14 years 23 days ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell