Sciweavers

1249 search results - page 213 / 250
» State Machine Modeling: From Synch States to Synchronized St...
Sort
View
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ISAAC
2003
Springer
85views Algorithms» more  ISAAC 2003»
14 years 27 days ago
Geometric Restrictions on Producible Polygonal Protein Chains
Fixed-angle polygonal chains in 3D serve as an interesting model of protein backbones. Here we consider such chains produced inside a “machine” modeled crudely as a cone, and e...
Erik D. Demaine, Stefan Langerman, Joseph O'Rourke
ICPR
2006
IEEE
14 years 8 months ago
Recognizing Facial Expressions by Tracking Feature Shapes
Reliable facial expression recognition by machine is still a challenging task. We propose a framework to recognise various expressions by tracking facial features. Our method uses...
Atul Kanaujia, Dimitris N. Metaxas
WWW
2004
ACM
14 years 8 months ago
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust n...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati
AI
2003
Springer
14 years 29 days ago
Pattern-Based AI Scripting Using ScriptEase
Creating realistic artificially-intelligent characters is seen as one of the major challenges of the commercial games industry. Historically, character behavior has been specifie...
Matthew McNaughton, James Redford, Jonathan Schaef...