Sciweavers

2573 search results - page 398 / 515
» Combinations of Modal Logics
Sort
View
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 10 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
ICDAR
2005
IEEE
15 years 10 months ago
Caption Localisation in Video Sequences by Fusion of Multiple Detectors
In this article, we focus on the problem of caption detection in video sequences. Contrary to most of existing approaches based on a single detector followed by an ad hoc and cost...
Sébastien Lefèvre, Nicole Vincent
ICDAR
2005
IEEE
15 years 10 months ago
From Searching to Browsing through Multimodal Documents Linking
Relationships that link static documents discussed during meetings to the corresponding speech transcripts can be of various kinds. The most important ones, thematic links, quotat...
Dalila Mekhaldi, Denis Lalanne, Rolf Ingold
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
15 years 10 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
ISCAS
2005
IEEE
122views Hardware» more  ISCAS 2005»
15 years 10 months ago
Linear and nonlinear macromodels for power/signal integrity
— In this paper, a systematic methodology for the assessment of Power/Signal Integrity effects in high-speed communication and information systems is presented. The proposed meth...
Stefano Grivet-Talocia, Igor S. Stievano, Ivan A. ...