Sciweavers

3938 search results - page 185 / 788
» Interactive Protocols on the Reals
Sort
View
ARTMED
2006
158views more  ARTMED 2006»
15 years 4 months ago
CareVis: Integrated visualization of computerized protocols and temporal patient data
Objective: Currently, visualization support for patient data analysis is mostly limited to the representation of directly measured data. Contextual information on performed treatm...
Wolfgang Aigner, Silvia Miksch
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
ENTCS
2008
390views more  ENTCS 2008»
15 years 3 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
ICST
2010
IEEE
15 years 3 months ago
Precisely Detecting Runtime Change Interactions for Evolving Software
Abstract—Developers often make multiple changes to software. These changes are introduced to work cooperatively or to accomplish separate goals. However, changes might not intera...
Raúl A. Santelices, Mary Jean Harrold, Ales...
BCSHCI
1997
15 years 5 months ago
BUILD-IT: A Computer Vision-based Interaction Technique for a Planning Tool
In this article we wish to show a method to go beyond the established approaches of human-computer interaction. We first bring a serious critique of traditional interface types, sh...
Matthias Rauterberg, Morten Fjeld, Helmut Krueger,...