Sciweavers

1121 search results - page 145 / 225
» Logics of Complementarity in Information Systems
Sort
View
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 2 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
ISCAS
2005
IEEE
122views Hardware» more  ISCAS 2005»
14 years 2 months ago
Linear and nonlinear macromodels for power/signal integrity
— In this paper, a systematic methodology for the assessment of Power/Signal Integrity effects in high-speed communication and information systems is presented. The proposed meth...
Stefano Grivet-Talocia, Igor S. Stievano, Ivan A. ...
FSTTCS
2004
Springer
14 years 2 months ago
A Calculus for Trust Management
We introduce ctm, a process calculus which embodies a notion of trust for global computing systems. In ctm each principal (location) is equipped with a policy, which determines its...
Marco Carbone, Mogens Nielsen, Vladimiro Sassone
GI
2003
Springer
14 years 2 months ago
Policy Based Management for Critical Infrastructure Protection
: Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both ...
Gwendal Le Grand, Franck Springinsfeld, Michel Rig...
IBPRIA
2007
Springer
13 years 10 months ago
Automatic Learning of Conceptual Knowledge in Image Sequences for Human Behavior Interpretation
This work describes an approach for the interpretation and explanation of human behavior in image sequences, within the context of a Cognitive Vision System. The information source...
Pau Baiget, Carles Fernández Tena, F. Xavie...