Sciweavers

130 search results - page 20 / 26
» User Authentication through Typing Biometrics Features
Sort
View
FAC
2007
128views more  FAC 2007»
13 years 7 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
GCC
2003
Springer
14 years 21 days ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
ISMIS
2003
Springer
14 years 20 days ago
Development of Generic Search Method Based on Transformation Invariance
Abstract. The needs of efficient and flexible information retrieval on multistructural data stored in database and network are significantly growing. Especially, its flexibility pl...
Fuminori Adachi, Takashi Washio, Hiroshi Motoda, A...
NPAR
2000
ACM
13 years 12 months ago
Animated CharToon faces
Human faces are attractive and effective in every-day communication. In human-computer interaction, because of the lack of sufficient knowledge and appropriate tools to model and ...
Zsófia Ruttkay, Han Noot
PPL
2008
99views more  PPL 2008»
13 years 7 months ago
A Modular Implementation of Data Structures in Bulk-Synchronous Parallel ML
A functional data-parallel language called BSML has been designed for programming Bulk-Synchronous Parallel algorithms. Many sequential algorithms do not have parallel counterpart...
Frédéric Gava