Sciweavers

5665 search results - page 1053 / 1133
» Introduction to Computer Security
Sort
View
JRTIP
2008
300views more  JRTIP 2008»
13 years 8 months ago
Real-time human action recognition on an embedded, reconfigurable video processing architecture
Abstract In recent years, automatic human action recognition has been widely researched within the computer vision and image processing communities. Here we propose a realtime, emb...
Hongying Meng, Michael Freeman, Nick Pears, Chris ...
MAGS
2008
169views more  MAGS 2008»
13 years 8 months ago
ACVisualizer: A visualization tool for APi-calculus
Process calculi are mathematical tools used for modeling and analyzing the structure and behavior of reactive systems. One such calculus, called APi-calculus (an extension to Pi-ca...
Raheel Ahmad, Shahram Rahimi
IJNSEC
2007
126views more  IJNSEC 2007»
13 years 8 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
ASE
2005
145views more  ASE 2005»
13 years 8 months ago
Developing Ambient Intelligence Systems: A Solution based on Web Services
Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectiv...
Valérie Issarny, Daniele Sacchetti, Ferda T...
TDSC
2008
152views more  TDSC 2008»
13 years 8 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
« Prev « First page 1053 / 1133 Last » Next »