Sciweavers

1301 search results - page 80 / 261
» Specifications via Realizability
Sort
View
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Remote Voice Acquisition in Multimodal Surveillance
Multimodal surveillance systems using visible/IR cameras and other sensors are widely deployed today for security purpose, particularly when subjects are at a large distance. Howe...
Weihong Li, Zhigang Zhu, George Wolberg
NCA
2006
IEEE
14 years 4 months ago
A System for Secure IP Telephone Conferences
We present a system for secure telephone conferences (stc) over the internet. The system ensures participant authentication via x.509 certificates, such that every participant of...
Axel Treßel, Jorg Keller
CSFW
2005
IEEE
14 years 3 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
DSN
2005
IEEE
14 years 3 months ago
A Performability-Oriented Software Rejuvenation Framework for Distributed Applications
While inherent resource redundancies in distributed applications facilitate gracefully degradable services, methods to enhance their dependability may have subtle, yet significan...
Ann T. Tai, Kam S. Tso, William H. Sanders, Savio ...
FSMNLP
2005
Springer
14 years 3 months ago
WFSM Auto-intersection and Join Algorithms
The join of two n-ary string relations is a main operation regarding to applications. n-Ary rational string relations are realized by weighted finite-state machines with n tapes. ...
André Kempe, Jean-Marc Champarnaud, Franck ...