Sciweavers

426 search results - page 77 / 86
» Towards Verifying Model Transformations
Sort
View
ICPR
2010
IEEE
14 years 3 months ago
Road Sign Detection in Images: A Case Study
Road sign identification in images is an important issue, in particular for vehicle safety applications. It is usually tackled in three stages: detection, recognition and trackin...
Rachid Belaroussi, Philippe Foucher, Jean-Philippe...
HT
2005
ACM
14 years 3 months ago
Searching a file system using inferred semantic links
We describe Eureka, a file system search engine that takes into account the inherent relationships among files in order to improve the rankings of search results. The key idea b...
Deepavali Bhagwat, Neoklis Polyzotis
HICSS
2003
IEEE
168views Biometrics» more  HICSS 2003»
14 years 3 months ago
'Pay-per-use' Concept in Healthcare: A Grounded Theory Perspective
Healthcare organizations worldwide are faced with the growing challenge of introducing structural and technological reforms and cost-effective IT solutions that will transform the...
Abdullah A. Akbar
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
14 years 3 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
OOPSLA
2001
Springer
14 years 2 months ago
Portable Resource Control in Java: The J-SEAL2 Approach
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and we...
Walter Binder, Jarle Hulaas, Alex Villazón