Sciweavers

1476 search results - page 223 / 296
» Designing Communication-intensive Web Applications: a Case S...
Sort
View
ICIAR
2010
Springer
15 years 9 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
15 years 8 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
WSC
2008
15 years 6 months ago
Using simulation in the implementation of an Outpatient Procedure Center
Creation of an Outpatient Procedure Center (OPC) is a complicated endeavor, requiring a detailed understanding of the resources available and the procedures to be performed. Misca...
Todd R. Huschka, Brian T. Denton, Bradly J. Narr, ...
ATAL
2008
Springer
15 years 6 months ago
The senior companion multiagent dialogue system
This article presents a multi-agent dialogue system. We show how a collection of relatively simple agents is able to treat complex dialogue phenomena and deal successfully with di...
Hugo Pinto, Yorick Wilks, Roberta Catizone, Alexie...
DAWAK
2008
Springer
15 years 6 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi