Sciweavers

361 search results - page 60 / 73
» Composition of Password-Based Protocols
Sort
View
IFIP
2004
Springer
14 years 26 days ago
Ensuring Termination by Typability
A term terminates if all its reduction sequences are of finite length. We show four type systems that ensure termination of well-typed π-calculus processes. The systems are obtai...
Yuxin Deng, Davide Sangiorgi
SIGCOMM
1996
ACM
13 years 11 months ago
ASHs: Application-Specific Handlers for High-Performance Messaging
Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely an...
Deborah A. Wallach, Dawson R. Engler, M. Frans Kaa...
FGR
2006
IEEE
154views Biometrics» more  FGR 2006»
13 years 11 months ago
Toward an Efficient and Accurate AAM Fitting on Appearance Varying Faces
Automatic extraction of facial feature deformations (either due to identity change or expression) is a challenging task and could be the base of a facial expression interpretation...
Hugo Mercier, Julien Peyras, Patrice Dalle
AAAI
2007
13 years 9 months ago
Representing and Reasoning about Commitments in Business Processes
A variety of business relationships in open settings can be understood in terms of the creation and manipulation of commitments among the participants. These include B2C and B2B c...
Nirmit Desai, Amit K. Chopra, Munindar P. Singh
FIW
2003
13 years 9 months ago
Representing New Voice Services and Their Features
New voice services are investigated in the fields of Internet telephony (SIP – Session Initiation Protocol) and interactive voice systems (VoiceXML – Voice Extended Markup La...
Kenneth J. Turner