Sciweavers

503 search results - page 88 / 101
» Authenticity by tagging and typing
Sort
View
HICSS
2003
IEEE
155views Biometrics» more  HICSS 2003»
14 years 25 days ago
Developing Analytic, Cognitive and Linguistic Skills with an Electronic Negotiation System
An increasing number of Web-based systems, including brainstorming, decision-making, and negotiation support systems, are being developed to aid users in solving particular types ...
Margaret J. Kersten, Marlene Haley, Gregory E. Ker...
ICDAR
2003
IEEE
14 years 25 days ago
Text-indicated Writer Verification Using Hidden Markov Models
We propose an HMM-based text-indicated writer verification method, which is based on a challenge and response type of authentication process. In this method, a different text incl...
Yasushi Yamazaki, Tsuyoshi Nagao, Naohisa Komatsu
ARTQOS
2003
Springer
14 years 23 days ago
An IP QoS Architecture for 4G Networks
: This paper describes an architecture for differentiation of Quality of Service in heterogeneous wireless-wired networks. This architecture applies an “all-IP” paradigm, with ...
Janusz Gozdecki, Piotr Pacyna, Victor Marques, Rui...
COLCOM
2007
IEEE
13 years 11 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
ESOP
2010
Springer
13 years 11 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers