Sciweavers

8828 search results - page 1619 / 1766
» Formal methods in practice
Sort
View
ECRTS
2005
IEEE
15 years 9 months ago
Applying Static WCET Analysis to Automotive Communication Software
The number of embedded computers used in modern cars have increased dramatically during the last years, as they provide increased functionality to a reduced cost compared to previ...
Susanna Byhlin, Andreas Ermedahl, Jan Gustafsson, ...
ICDCS
2005
IEEE
15 years 9 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
VISUALIZATION
2005
IEEE
15 years 9 months ago
Topology-driven Surface Mappings with Robust Feature Alignment
Topological concepts and techniques have been broadly applied in computer graphics and geometric modeling. However, the homotopy type of a mapping between two surfaces has not bee...
Christopher Carner, Miao Jin, Xianfeng Gu, Hong Qi...
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
137
Voted
ASSETS
2004
ACM
15 years 9 months ago
Text entry from power wheelchairs: edgewrite for joysticks and touchpads
Power wheelchair joysticks have been used to control a mouse cursor on desktop computers, but they offer no integrated text entry solution, confining users to point-and-click or p...
Jacob O. Wobbrock, Brad A. Myers, Htet Htet Aung, ...
« Prev « First page 1619 / 1766 Last » Next »