Sciweavers

20655 search results - page 3929 / 4131
» Exploring Software Systems
Sort
View
CCS
2008
ACM
14 years 24 days ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
CIKM
2008
Springer
14 years 23 days ago
Purpose tagging: capturing user intent to assist goal-oriented social search
The terms that are used by users during tagging have been found to be different from the terms that are used when searching for resources, which represents a fundamental problem f...
Markus Strohmaier
CHINZ
2005
ACM
14 years 23 days ago
InkKit: a generic design tool for the tablet PC
In this paper, we describe the design philosophy, implementation and evaluation of InkKit, an informal design platform that uses pen input on a tablet PC to imitate the informalit...
Ronald Chung, Petrut Mirica, Beryl Plimmer
ACAL
2007
Springer
14 years 18 days ago
Modelling Architectural Visual Experience Using Non-linear Dimensionality Reduction
This paper addresses the topic of how architectural visual experience can be represented and utilised by a software system. The long-term aim is to equip an artificial agent with ...
Stephan K. Chalup, Riley Clement, Chris Tucker, Mi...
CCS
2008
ACM
14 years 18 days ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
« Prev « First page 3929 / 4131 Last » Next »