Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Testing today of a several hundred million transistor System-on-Chip with analog, RF blocks, many processor cores and tens of memories is a huge task. What will test technology be...
Abstract. In this paper we present the architecture of an Adaptive Educational Hypermedia System, named INSPIRE. This particular system, throughout its interaction with the learner...
Kyparisia A. Papanikolaou, Maria Grigoriadou, Harr...
Abstract. Based on the design of the CS Freiburg team, which participated sucessfully in Robocup’98, we developed a new team of robotic soccer players. While the hardware compone...
Bernhard Nebel, Jens-Steffen Gutmann, Wolfgang Hat...
Modern computer-supported cooperative work applications (CSCW) supporting same-time/different-place interaction are required to open several communication channels. Each of these ...