Sciweavers

5398 search results - page 954 / 1080
» On the Effective Use of Software Standards in Systems Integr...
Sort
View
IEEEARES
2008
IEEE
14 years 3 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
HICSS
1996
IEEE
165views Biometrics» more  HICSS 1996»
14 years 1 months ago
Advanced Distributed Simulation through the Aggregate Level Simulation Protocol
The venerable problem solving technique of simulation finds itself inthe midstof a revolution. Where once it was regarded as a "technique of last resort" for systems ana...
Richard M. Weatherly, Annette L. Wilson, Bradford ...
EWC
2007
102views more  EWC 2007»
13 years 9 months ago
Interactive collision detection in three-dimensional visualizations of simulated construction operations
This paper presents research that led to the design and implementation of fast and interactive collision detection methods that can be used to identify and report undesirable conï¬...
Vineet R. Kamat, Julio C. Martínez
CGF
2010
119views more  CGF 2010»
13 years 9 months ago
Visual Analysis of Multi-Joint Kinematic Data
Kinematics is the analysis of motions without regarding forces or inertial effects, with the purpose of understanding joint behaviour. Kinematic data of linked joints, for example...
Peter R. Krekel, Edward R. Valstar, Jurriaan De Gr...
CCS
2010
ACM
13 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...