Sciweavers

793 search results - page 101 / 159
» Protocol Modeling with Model Program Composition
Sort
View
ICALP
2005
Springer
14 years 2 months ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi
FGR
2006
IEEE
154views Biometrics» more  FGR 2006»
14 years 25 days ago
Toward an Efficient and Accurate AAM Fitting on Appearance Varying Faces
Automatic extraction of facial feature deformations (either due to identity change or expression) is a challenging task and could be the base of a facial expression interpretation...
Hugo Mercier, Julien Peyras, Patrice Dalle
AAAI
2007
13 years 11 months ago
Representing and Reasoning about Commitments in Business Processes
A variety of business relationships in open settings can be understood in terms of the creation and manipulation of commitments among the participants. These include B2C and B2B c...
Nirmit Desai, Amit K. Chopra, Munindar P. Singh
CORR
2011
Springer
221views Education» more  CORR 2011»
13 years 4 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
ECOOP
2003
Springer
14 years 2 months ago
Traits: Composable Units of Behaviour
Despite the undisputed prominence of inheritance as the fundamental reuse mechanism in object-oriented programming languages, the main variants — single inheritance, multiple inh...
Nathanael Schärli, Stéphane Ducasse, O...