Sciweavers

2002 search results - page 81 / 401
» Interactive technical illustration
Sort
View
CCS
2005
ACM
14 years 3 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
DISCEX
2003
IEEE
14 years 3 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
ICDAR
2003
IEEE
14 years 3 months ago
A Line Drawings Degradation Model for Performance Characterization
Line detection algorithms constitute the basis for technical document analysis and recognition. The performance of these algorithms decreases as the quality of the documents degra...
Jian Zhai, Liu Wenyin, Dov Dori, Qing Li
GI
2009
Springer
14 years 2 months ago
Mobile computing in mass casualty incidents (MCIs)
: This paper illustrates the future role of mobile computing for the response in emergencies and mass casualty incidents (MCIs). Furthermore it describes the different components a...
Simon Nestler, Gudrun Klinker
CSCW
1996
ACM
14 years 1 months ago
Freeflow: Mediating Between Representation and Action in Workflow Systems
In order to understand some problems associated with workflow, we set out an analysis of workflow systems, identifying a number of basic issues in the underlying technology. This ...
Paul Dourish, Jim Holmes, Allan MacLean, Pernille ...