Sciweavers

465 search results - page 19 / 93
» Letter from the editors
Sort
View
IJNSEC
2006
75views more  IJNSEC 2006»
13 years 7 months ago
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
The Short Secret Sharing Protocols (S3P), proposed by Roe et al in 1998 [13] and revised in 2003 [14], is a family of protocols that bootstrap secure session keys from weak secret...
Jolyon Clulow
MKM
2004
Springer
14 years 1 months ago
CPoint: Dissolving the Author's Dilemma
Abstract. Automated knowledge management techniques critically depend on the availability of semantically enhanced documents which are hard to come by in practice. Starting from a ...
Andrea Kohlhase, Michael Kohlhase
ICMCS
2000
IEEE
213views Multimedia» more  ICMCS 2000»
14 years 3 days ago
Extending Databases to Support Image Editing
In order to understand similarity between images, recent research has focused on adaptable searches [9] and fuzzy queries [4]. However, one of the best means for determining simil...
Gregory D. Speegle, Allen M. Gao, Shaowen Hu, Le G...
ICSE
1997
IEEE-ACM
13 years 12 months ago
Rigi: A Visualization Environment for Reverse Engineering
The Rigi reverse engineering system provides two contrasting approaches for presenting software structures in its graph editor. The rst displays the structures through multiple, i...
Margaret-Anne D. Storey, Kenny Wong, Hausi A. M&uu...
HAPTICS
2009
IEEE
14 years 2 months ago
Vibrotactile score: A score metaphor for designing vibrotactile patterns
Despite the plethora of vibrotactile applications that already have begun to impact our everyday life, how to design vibrotactile patterns easily and efficiently remains to be a ...
Jaebong Lee, Jonghyun Ryu, Seungmoon Choi