Sciweavers

2642 search results - page 198 / 529
» The development of Chez Scheme
Sort
View
FC
2005
Springer
119views Cryptology» more  FC 2005»
15 years 10 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
ICCS
2005
Springer
15 years 10 months ago
Dynamic Memory Management in the Loci Framework
Abstract. Resource management is a critical concern in high-performance computing software. While management of processing resources to increase performance is the most critical, e...
Yang Zhang, Edward A. Luke
UCS
2004
Springer
15 years 10 months ago
Dependable Coding of Fiducial Tags
Fiducial tags can be recognised successfully and decoded by computer vision systems in order to produce location information. We term a system dependable if its observable results ...
Andrew C. Rice, Christopher B. Cain, John K. Fawce...
DEXAW
2003
IEEE
128views Database» more  DEXAW 2003»
15 years 10 months ago
Current Mobile Payment Procedures on the German Market from the View of Customer Requirements
The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the mos...
Key Pousttchi, Mario Zenker
ICDAR
2003
IEEE
15 years 10 months ago
Detection, Extraction and Representation of Tables
We are concerned with the extraction of tables from exchange format representations of very diverse composite documents. We put forward a flexible representation scheme for comple...
Jean-Yves Ramel, Michel Crucianu, Nicole Vincent, ...