11 resultados para graphical authentication

em Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho"


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Web service-based application is an architectural style, where a collection of Web services communicate to each other to execute processes. With the popularity increase of Web service-based applications and since messages exchanged inside of this applications can be complex, we need tools to simplify the understanding of interrelationship among Web services. This work present a description of a graphical representation of Web service-based applications and the mechanisms inserted among Web service requesters and providers to catch information to represent an application. The major contribution of this paper is to discus and use HTTP and SOAP information to show a graphical representation similar to a UML sequence diagram of Web service-based applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We studied the succession of small mammal species after fire in the cerrado (Neotropical savanna) of Central Brazil. Populations of small mammals were sampled with live-trapping techniques in a series of nine sites of different successional age, ranging from 1 to 26 years after fire. Ten species of small mammals were captured through all the seral stages of succession. Species richness ranged from two to seven species by seral stage. The species were arranged in different groups with respect to abundance along the succession: the first was composed of early successional species that peaked <2 years after fire (Calomys callosus, C. tener, Thalpomys cerradensis, Mus musculus, Thylamys velutinus); the second occurred or peaked 2-3 years after fire (Necromys lasiurus, Gracilinanus sp., Oryzomys scoth). Gracilinanus agilis peaked in the last seral stage. Species richness of small mammals showed an abrupt decrease from an average of four species immediately after fire to two species 5-26 years after the last fire. We propose a simple graphical model to explain the pattern of species richness of small mammals after fire in the cerrado. This model assumes that the occurrence of species of small mammals is determined by habitat selection behavior by each species along a habitat gradient. The habitat gradient is defined as the ratio of cover of herbaceous to woody vegetation. The replacement of species results from a trade-off in habitat requirements for the two habitat variables.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently the CP trajectory diagram was introduced to demonstrate the difference between the intrinsic CP violating effects to those induced by matter for neutrino oscillation. In this Letter we introduce the T trajectory diagram. In these diagrams the probability for a given oscillation process is plotted versus the probability for the CP- or the T-conjugate processes, which forms an ellipse as the CP- or T-violating phase is varied. Since the CP- and the T-conjugate processes are related by CPT symmetry, even in the presence of matter, these two trajectory diagrams are closely related with each other and form a unified description of neutrino oscillations in matter. (C) 2002 Published by Elsevier B.V. B.V.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increase of computing power of the microcomputers has stimulated the building of direct manipulation interfaces that allow graphical representation of Linear Programming (LP) models. This work discusses the components of such a graphical interface as the basis for a system to assist users in the process of formulating LP problems. In essence, this work proposes a methodology which considers the modelling task as divided into three stages which are specification of the Data Model, the Conceptual Model and the LP Model. The necessity for using Artificial Intelligence techniques in the problem conceptualisation and to help the model formulation task is illustrated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article, we present quasiconformal mappings related to octonionic algebra. Based on the metric definition of quasiconformal mappings and using transformations of the type f(z)=zn, we compare the graphical and analytic results. © 2009 Pushpa Publishing House.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient mechanisms that assures user authentication in this sort of environment, in the system login as well as throughout his session, has been pointed out as a serious deficiency. Some studies have been led about possible biometric applications for web authentication. However, password based authentication still prevails. With the popularization of biometric enabled devices and resultant fall of prices for the collection of biometric traits, biometrics is reconsidered as a secure remote authentication form for web applications. In this work, the face recognition accuracy, captured on-line by a webcam in Internet environment, is investigated, simulating the natural interaction of a person in the context of a distance course environment. Partial results show that this technique can be successfully applied to confirm the presence of users throughout the course attendance in an educational distance course. An efficient client/server architecture is also proposed. © 2009 Springer Berlin Heidelberg.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on conventional cryptographic systems, as the passwords can be easily copied or stolen. The usage of a biometric approach for releasing the keys is an alternative to the password-based mechanisms. But just like passwords, we need mechanisms to keep the biometrical signal safe. One approach for such mechanism is to use biometrical key cryptography. The cryptographic systems based on the use of biometric characteristics as keys are called biometrical cryptographic systems. This article presents the implementation of Fuzzy Vault, a biometrical cryptographic system written in Java, along with its performance evaluation. Fuzzy Vault was tested on a real application using smartcards.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research on the micro-structural characterization of metal-matrix composites uses X-ray computed tomography to collect information about the interior features of the samples, in order to elucidate their exhibited properties. The tomographic raw data needs several steps of computational processing in order to eliminate noise and interference. Our experience with a program (Tritom) that handles these questions has shown that in some cases the processing steps take a very long time and that it is not easy for a Materials Science specialist to interact with Tritom in order to define the most adequate parameter values and the proper sequence of the available processing steps. For easing the use of Tritom, a system was built which addresses the aspects described before and that is based on the OpenDX visualization system. OpenDX visualization facilities constitute a great benefit to Tritom. The visual programming environment of OpenDX allows an easy definition of a sequence of processing steps thus fulfilling the requirement of an easy use by non-specialists on Computer Science. Also the possibility of incorporating external modules in a visual OpenDX program allows the researchers to tackle the aspect of reducing the long execution time of some processing steps. The longer processing steps of Tritom have been parallelized in two different types of hardware architectures (message-passing and shared-memory); the corresponding parallel programs can be easily incorporated in a sequence of processing steps defined in an OpenDX program. The benefits of our system are illustrated through an example where the tool is applied in the study of the sensitivity to crushing – and the implications thereof – of the reinforcements used in a functionally graded syntactic metallic foam.