Sciweavers

533 search results - page 71 / 107
» Verification of Distributed Firewalls
Sort
View
CVPR
2007
IEEE
14 years 4 months ago
A Minutiae-based Fingerprint Individuality Model
Fingerprint individuality study deals with the crucial problem of the discriminative power of fingerprints for recognizing people. In this paper, we present a novel fingerprint in...
Jiansheng Chen, Yiu Sang Moon
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 3 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ATAL
2005
Springer
14 years 3 months ago
A software tool for the development of MAS communication protocols based on conversations
The work we present here is mainly concerned with interagent communication, MAS communication protocols and, in particular, software tools and environments to define, experiment a...
Madieyna Lamine Fall, Sylvain Delisle
SIGDOC
2003
ACM
14 years 3 months ago
Liability for defective documentation
Several companies are careless about the accuracy of their user manuals and online help, leading readers to believe that a product has characteristics that it lacks. Under America...
Cem Kaner
ACSD
1998
IEEE
113views Hardware» more  ACSD 1998»
14 years 2 months ago
Modeling and Analyzing Interorganizational Workflows
Today's corporations often must operate across organizational boundaries. Phenomena such as electronic commerce, extended enterprises, and the Internet stimulate cooperation ...
Wil M. P. van der Aalst