Sciweavers

2314 search results - page 84 / 463
» What's in a model
Sort
View
SIS
2008
13 years 11 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
SPLC
2008
13 years 11 months ago
Automated Domain-Specific Modeling Languages for Generating Framework-Based Applications
The adoption of Domain-Specific Modeling Languages (DSMLs) for generating framework-based applications has proved to be an effective way of enforcing the correct use of frameworks...
André L. Santos, Kai Koskimies, Antó...
IFIP11
2004
110views Business» more  IFIP11 2004»
13 years 11 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
HCI
2001
13 years 11 months ago
Modeling spontaneous speech events during recognition
In spontaneous speech, speakers segment their speech into intonational phrases, and make repairs to what they are saying. However, techniques for understanding spontaneous speech ...
Peter A. Heeman
ICPR
2006
IEEE
14 years 11 months ago
Compound Stochastic Models For Fingerprint Individuality
The question of fingerprint individuality can be posed as follows: Given a query fingerprint, what is the probability that the observed number of minutiae matches with a template ...
Anil K. Jain, Sarat C. Dass, Yongfang Zhu