Sciweavers

329 search results - page 61 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
COMPSAC
2002
IEEE
14 years 18 days ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...
SIGUCCS
2000
ACM
13 years 12 months ago
Putting Help Where the User Is - A Desktop Computer Support Strategy
As the personal computer becomes a more integral part of the faculty member’s job, the increasing level of day-to-day computer support - often without increases in full-time sta...
Cheryl Stahler
HUC
1999
Springer
13 years 12 months ago
On Positioning for Augmented Reality Systems
In Augmented Reality (AR), see-through Head Mounted Displays (HMDs) superimpose virtual 3D objects over the real world. They have the potential to enhance a user's perception ...
Stelian Persa, Pieter Jonker
DBPL
1989
Springer
165views Database» more  DBPL 1989»
13 years 11 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...
IEAAIE
2000
Springer
13 years 11 months ago
Maintenance of KBS's by Domain Experts: The Holy Grail in Practice
Enabling a domain expert to maintain his own knowledge in a Knowledge Based System has long been an ideal for the Knowledge Engineering community. In this paper we report on our ex...
Arne Bultmann, Joris Kuipers, Frank van Harmelen