Sciweavers

959 search results - page 92 / 192
» Possible and Necessary h-Indices
Sort
View
CCS
2009
ACM
14 years 3 months ago
Anonymous credentials on a standard java card
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time usercentric identity management gains acceptance. Anonymous credential sch...
Patrik Bichsel, Jan Camenisch, Thomas Groß, ...
VMCAI
2009
Springer
14 years 3 months ago
Mixed Transition Systems Revisited
—A variety of partial modeling formalisms, aimed re and reason about abstractions, have been proposed. Some, e.g., Kripke Modal Transition Systems (KMTSs) put strong restrictions...
Ou Wei, Arie Gurfinkel, Marsha Chechik
IAT
2009
IEEE
14 years 3 months ago
Towards Zero-Delay Recovery of Agents in Production Automation Systems
Multi-agent systems (MAS) is an accepted paradigm in safety-critical systems, like the production automation. Agents control the underlying machinery they are representing and int...
eva Kühn, Richard Mordinyi, Mario Lang, Adnan...
ICC
2009
IEEE
147views Communications» more  ICC 2009»
14 years 3 months ago
Distributed Quality-Lifetime Maximization in Wireless Video Sensor Networks
—Owing to the availability of low-cost and low-power CMOS cameras, Wireless Video Sensor Networks (WVSN) has recently become a reality. However video encoding is still a costly p...
Eren Gürses, Yuan Lin, Raouf Boutaba
ICDAR
2009
IEEE
14 years 3 months ago
Text Line Segmentation Based on Morphology and Histogram Projection
Text extraction is an important phase in document recognition systems. In order to segment text from a page document it is necessary to detect all the possible manuscript text reg...
Rodolfo P. dos Santos, Gabriela S. Clemente, Ing R...