Sciweavers

4636 search results - page 804 / 928
» Modelling and Validation with VipTool
Sort
View
MMMACNS
2001
Springer
14 years 1 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
NOSSDAV
2001
Springer
14 years 1 months ago
Dimensioning server access bandwidth and multicast routing in overlay networks
Application-level multicast is a new mechanism for enabling multicast in the Internet. Driven by the fast growth of network audio/video streams, application-level multicast has be...
Sherlia Shi, Jonathan S. Turner, Marcel Waldvogel
SEMWEB
2001
Springer
14 years 1 months ago
Utilizing Host-Formalisms to Extend RDF-Semantics
Abstract. RDF may be considered as an application of XML intended to interoperably exchange semantics between Web applications. In its current form, this objective may be hard to r...
Wolfram Conen, Reinhold Klapsing
ACSAC
2000
IEEE
14 years 1 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
FGR
2000
IEEE
112views Biometrics» more  FGR 2000»
14 years 1 months ago
A Probabilistic Sensor for the Perception of Activities
This paper presents a new technique for the perception of activities using statistical description of spatio-temporal properties. With this approach, the probability of an activit...
Olivier Chomat, James L. Crowley