Sciweavers

3883 search results - page 137 / 777
» Design mentoring based on design evolution analysis
Sort
View
ISBI
2007
IEEE
14 years 3 months ago
Design and Calibration of a Virtual Tomographic Reflection System
Virtual Tomographic Reflection (VTR) is a new augmented reality technique that allows users to view volumetric image data using an interaction paradigm based on medical ultrasoun...
Damion Shelton, Bing Wu, Roberta L. Klatzky, Georg...
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
14 years 3 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
IFIP
2010
Springer
14 years 1 months ago
Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation
Abstract Flow Accounting is a passive monitoring mechanism implemented in routers that gives insight into trac behavior and network characteristics. However, processing of Flow Ac...
Jochen Kögel, Sebastian Scholz
DIMEA
2008
176views Multimedia» more  DIMEA 2008»
13 years 11 months ago
Designing GUI for the user configuration of pervasive awareness applications
The vision of Pervasive and Ubiquitous Computing promises that our future environments will be furnished with an increasing number of computationally augmented artifacts. Conseque...
Eleni Romoudi, Theodosia Fokidou
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
13 years 10 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel