Sciweavers

279 search results - page 27 / 56
» 20 Years of ECM
Sort
View
HICSS
2005
IEEE
153views Biometrics» more  HICSS 2005»
14 years 1 months ago
SOTIP as a Model for Outsourcing of Telecom Services for the Public Sector
The political intentions for the past 20 years have broadly speaking been to reduce the number of publicly owned and publicly run activities. Outsourcing is an often applied way t...
Helena Lindskog
MM
2005
ACM
94views Multimedia» more  MM 2005»
14 years 29 days ago
Tracking users' capture intention: a novel complementary view for home video content analysis
In this paper, we present a novel view to home video content analysis, which aims at tracking the capture intention of camcorder users. Based on the study of intention mechanism i...
Tao Mei, Xian-Sheng Hua, He-Qin Zhou
SENSYS
2005
ACM
14 years 29 days ago
Everlast: long-life, supercapacitor-operated wireless sensor node
This paper describes a supercapacitor-operated, solar-powered wireless sensor node called Everlast. Unlike traditional wireless sensors that store energy in batteries, Everlast’...
Farhan Simjee, Devyani Sharma, Pai H. Chou
SIGDOC
2005
ACM
14 years 29 days ago
A study of the documentation essential to software maintenance
Software engineering has been striving for years to improve the practice of software development and maintenance. Documentation has long been prominent on the list of recommended ...
Sergio Cozzetti B. de Souza, Nicolas Anquetil, K&a...
ACISP
2005
Springer
14 years 29 days ago
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity
Abstract. The PCBC block cipher mode of operation has many variants, of which one, due to Meyer and Matyas, dates back over 20 years. Whilst a particularly simple variant of PCBC h...
Chris J. Mitchell