Sciweavers

179 search results - page 27 / 36
» ic 2007
Sort
View
CN
2007
97views more  CN 2007»
13 years 7 months ago
Security enhancement of an IC-card-based remote login mechanism
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand th...
Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang
CAI
2007
Springer
13 years 11 months ago
Bifinite Chu Spaces
This paper studies colimits of sequences of finite Chu spaces and their ramifications. We consider three base categories of Chu spaces: the generic Chu spaces (C), the extensional ...
Manfred Droste, Guo-Qiang Zhang
CIVR
2008
Springer
220views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Web-based information content and its application to concept-based video retrieval
Semantic similarity between words or phrases is frequently used to find matching correlations between search queries and documents when straightforward matching of terms fails. Th...
Alexander Haubold, Apostol Natsev
ICS
2007
Tsinghua U.
14 years 1 months ago
Representation-transparent matrix algorithms with scalable performance
Positive results from new object-oriented tools for scientific programming are reported. Using template classes, abstractions of matrix representations are available that subsume...
Peter Gottschling, David S. Wise, Michael D. Adams
FUIN
2007
99views more  FUIN 2007»
13 years 7 months ago
Verifying Security Protocols Modelled by Networks of Automata
In this paper we show a novel method for modelling behaviours of security protocols using networks of communicating automata in order to verify them with SAT-based bounded model ch...
Miroslaw Kurkowski, Wojciech Penczek