Sciweavers

11588 search results - page 100 / 2318
» Will They Like This
Sort
View
FSTTCS
2007
Springer
14 years 4 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
MTSR
2007
Springer
14 years 4 months ago
agroXML Enabling Standardized, Platform-Independent Internet Data Exchange in Farm Management Information Systems
agroXML is a standardized language for data exchange in agriculture. It is based on the eXtensible Markup Language (XML) using XML Schema as its definition language. agroXML is us...
Mario Schmitz, Daniel Martini, Martin Kunisch, Han...
FGR
2006
IEEE
173views Biometrics» more  FGR 2006»
14 years 4 months ago
Facial Feature Detection and Tracking with Automatic Template Selection
We describe an accurate and robust method of locating facial features. The method utilises a set of feature templates in conjunction with a shape constrained search technique. The...
David Cristinacce, Timothy F. Cootes
HICSS
2006
IEEE
82views Biometrics» more  HICSS 2006»
14 years 4 months ago
A Preliminary Investigation of the Impact of the Sarbanes-Oxley Act on Information Security
This paper examines the information security implications of the Sarbanes-Oxley (SOX) Act of 2002. It is well-established in the information systems field that managers do not ran...
Janine L. Spears, Robert J. Cole
ICMCS
2006
IEEE
175views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Bringing the Wiki Collaboration Model to the Tabletop World
We present an interactive workspace that integrates wiki collaboration in knowledge-building activities with face-to-face scenarios like brainstorming or problem solving sessions....
Stefano Baraldi, Alberto Del Bimbo, Alessandro Val...