Sciweavers

1282 search results - page 133 / 257
» Signing on signing off
Sort
View
ISVC
2007
Springer
14 years 4 months ago
Fuzzy Morphology for Edge Detection and Segmentation
Abstract. This paper proposes a new approach for structure based separation of image objects using fuzzy morphology. With set operators in fuzzy context, we apply an adaptive alpha...
Atif Bin Mansoor, Ajmal S. Mian, Adil Khan, Shoab ...
PKC
2007
Springer
135views Cryptology» more  PKC 2007»
14 years 4 months ago
A Direct Anonymous Attestation Scheme for Embedded Devices
Abstract. Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. Th...
He Ge, Stephen R. Tate
SAS
2007
Springer
112views Formal Methods» more  SAS 2007»
14 years 4 months ago
Taming the Wrapping of Integer Arithmetic
Variables in programs are usually confined to a fixed number of bits and results that require more bits are truncated. Due to the use of 32-bit and 64-bit variables, inadvertent ...
Axel Simon, Andy King
TCC
2007
Springer
145views Cryptology» more  TCC 2007»
14 years 4 months ago
(Password) Authenticated Key Establishment: From 2-Party to Group
Abstract. A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment...
Michel Abdalla, Jens-Matthias Bohli, Maria Isabel ...
UM
2007
Springer
14 years 4 months ago
Eliciting Adaptation Knowledge from On-Line Tutors to Increase Motivation
In the classroom, teachers know how to motivate their students and how to exploit this knowledge to adapt or optimize their instruction when a student shows signs of demotivation. ...
Teresa Hurley, Stephan Weibelzahl