Sciweavers

3999 search results - page 745 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
13 years 11 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
HUC
2010
Springer
13 years 7 months ago
Bayesian recognition of motion related activities with inertial sensors
This work presents the design and evaluation of an activity recognition system for seven important motion related activities. The only sensor used is an Inertial Measurement Unit ...
Korbinian Frank, Maria Josefa Vera Nadales, Patric...
SAC
2008
ACM
13 years 7 months ago
Aggregation languages for moving object and places of interest
We address aggregate queries over GIS data and moving object data, where non-spatial information is stored in a data warehouse. We propose a formal data model and query language t...
Leticia I. Gómez, Bart Kuijpers, Alejandro ...
MFCS
1995
Springer
13 years 11 months ago
An Abstract Account of Composition
act Account of Composition Mart n Abadi1 and Stephan Merz2 1 Digital Equipment Corporation, Systems Research Center, 130 Lytton Avenue, Palo Alto, CA 94301, U.S.A. 2 Institut fur I...
Martín Abadi, Stephan Merz
WWW
2003
ACM
14 years 8 months ago
Towards a multimedia formatting vocabulary
Time-based, media-centric Web presentations can be described declaratively in the XML world through the development of languages such as SMIL. It is difficult, however, to fully i...
Jacco van Ossenbruggen, Lynda Hardman, Joost Geurt...