Sciweavers

270 search results - page 29 / 54
» Building Software Securely from the Ground Up
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 11 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
ATAL
2008
Springer
15 years 6 months ago
A domain specific modeling language for multiagent systems
Software systems are becoming more and more complex with a large number of interacting partners often distributed over a network. A common dilemma faced by software engineers in b...
Christian Hahn
COMPSAC
2007
IEEE
15 years 11 months ago
Towards Requirements Engineering for Context Adaptive Systems
Building realistic end user scenarios for ubiquitous computing applications entails large up-front investments. Many context adaptive applications so far fail to live up to their ...
Wassiou Sitou, Bernd Spanfelner
AUIC
2002
IEEE
15 years 9 months ago
The Tinmith System - Demonstrating New Techniques for Mobile Augmented Reality Modelling
This paper presents user interface technology, using a glove based menuing system and 3D interaction techniques. It is designed to support applications that allow users to constru...
Wayne Piekarski, Bruce H. Thomas
EUROMICRO
2004
IEEE
15 years 8 months ago
Towards an Event-Driven Workplace for Knowledge Integration
A contemporary office or knowledge worker has to deal with an ever increasing number of information channels and associated flows of events (i.e., software applications using vary...
Alexander Schatten, Stefan Biffl