Sciweavers

464 search results - page 54 / 93
» Identity Management
Sort
View
CIS
2005
Springer
14 years 1 months ago
On Anonymity of Group Signatures
A secure group signature is required to be anonymous, that is, given two group signatures generated by two different members on the same message or two group signatures generated ...
Sujing Zhou, Dongdai Lin
EUROPAR
2004
Springer
14 years 1 months ago
Scheduling Under Conditions of Uncertainty: A Bayesian Approach
The efficient execution of irregular parallel applications on shared distributed systems requires novel approaches to scheduling, since both the application requirements and the sy...
Luís Paulo Santos, Alberto José Proe...
DISCEX
2003
IEEE
14 years 1 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
ICDAR
2003
IEEE
14 years 1 months ago
Automated Detection and Segmentation of Table of Contents Page from Document Images
With an aim to extract the structural information from the table of contents (TOC) to help develop digital document library the requirement of identifying/segmenting the TOC page ...
S. Mandal, S. P. Chowdhury, Amit Kumar Das, Bhabat...
ICSM
2003
IEEE
14 years 1 months ago
Towards a Versioning Model for Component-based Software Assembly
The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, ...
Jaroslav Gergic