Sciweavers

5255 search results - page 963 / 1051
» Formal Methods for Privacy
Sort
View
COMCOM
2007
83views more  COMCOM 2007»
13 years 10 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
IJFCS
2006
111views more  IJFCS 2006»
13 years 10 months ago
Completeness and realizability: conditions for automatic generation of workflows
In recent years, workflow technology has greatly facilitated business process modeling and reengineering in information systems. On one hand, the separation of an application'...
Shiyong Lu, Arthur J. Bernstein, Philip M. Lewis
IVC
2008
129views more  IVC 2008»
13 years 10 months ago
3D Motion from structures of points, lines and planes
In this article we propose a method for estimating the camera motion from a video-sequence acquired in the presence of general 3D structures. Solutions to this problem are commonl...
Andrea Dell'Acqua, Augusto Sarti, Stefano Tubaro
JAPLL
2008
121views more  JAPLL 2008»
13 years 10 months ago
Reasoning with prioritized information by iterative aggregation of distance functions
We introduce a general framework for reasoning with prioritized propositional data by aggregation of distance functions. Our formalism is based on a possible world semantics, wher...
Ofer Arieli
IJON
2006
131views more  IJON 2006»
13 years 10 months ago
Optimizing blind source separation with guided genetic algorithms
This paper proposes a novel method for blindly separating unobservable independent component (IC) signals based on the use of a genetic algorithm. It is intended for its applicati...
J. M. Górriz, Carlos García Puntonet...