Sciweavers

2268 search results - page 167 / 454
» The Essence of Form Abstraction
Sort
View
FC
2005
Springer
80views Cryptology» more  FC 2005»
14 years 1 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
FM
2005
Springer
125views Formal Methods» more  FM 2005»
14 years 1 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...
HYBRID
2005
Springer
14 years 1 months ago
Bisimulation for Communicating Piecewise Deterministic Markov Processes (CPDPs)
Abstract. CPDPs (Communicating Piecewise Deterministic Markov Processes) can be used for compositional specification of systems from the class of stochastic hybrid processes forme...
Stefan Strubbe, A. J. van der Schaft
ICAPR
2005
Springer
14 years 1 months ago
Automatic Table Detection in Document Images
Abstract. In this paper, we propose a novel technique for automatic table detection in document images. Lines and tables are among the most frequent graphic, non-textual entities i...
Basilios Gatos, Dimitrios Danatsas, Ioannis Pratik...
ICDCIT
2005
Springer
14 years 1 months ago
Merging Clustering Algorithms in Mobile Ad Hoc Networks
Abstract. Clustering is a widely used approach to ease implementation of various problems such as routing and resource management in mobile ad hoc networks (MANET)s. We propose a n...
Orhan Dagdeviren, Kayhan Erciyes, Deniz Cokuslu