Sciweavers

2659 search results - page 523 / 532
» Do we mean the same
Sort
View
ESORICS
2012
Springer
11 years 10 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
ISBI
2008
IEEE
14 years 8 months ago
Monte Carlo assessment of time-of-flight benefits on the LYSO-based discovery RX PET/CT scanner
Time-Of-Flight (TOF) positron emission tomography (PET) was studied and preliminarily developed in the 80s, but the lack of a scintillator able to deliver proper time resolution a...
Parham Geramifar, Mohammad Reza Ay, Mojtaba Shamsa...
WWW
2004
ACM
14 years 8 months ago
Schemapath, a minimal extension to xml schema for conditional constraints
In the past few years, a number of constraint languages for XML documents has been proposed. They are cumulatively called schema languages or validation languages and they compris...
Claudio Sacerdoti Coen, Paolo Marinelli, Fabio Vit...
POPL
2006
ACM
14 years 8 months ago
Fast and loose reasoning is morally correct
Functional programmers often reason about programs as if they were written in a total language, expecting the results to carry over to non-total (partial) languages. We justify su...
Nils Anders Danielsson, John Hughes, Patrik Jansso...
ICSE
2005
IEEE-ACM
14 years 7 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...