Sciweavers

13489 search results - page 2597 / 2698
» Operating System
Sort
View
DRM
2007
Springer
15 years 10 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
162
Voted
SMA
2005
ACM
239views Solid Modeling» more  SMA 2005»
15 years 10 months ago
Bender: a virtual ribbon for deforming 3D shapes in biomedical and styling applications
In contrast to machined mechanical parts, the 3D shapes encountered in biomedical or styling applications contain many tubular parts, protrusions, engravings, embossings, folds, a...
Ignacio Llamas, Alexander Powell, Jarek Rossignac,...
POPL
2008
ACM
16 years 4 months ago
Boomerang: resourceful lenses for string data
A lens is a bidirectional program. When read from left to right, it denotes an ordinary function that maps inputs to outputs. When read from right to left, it denotes an "upd...
Aaron Bohannon, J. Nathan Foster, Benjamin C. Pier...
JNCA
2007
125views more  JNCA 2007»
15 years 4 months ago
Distributed middleware architectures for scalable media services
The fusion of Multimedia and Internet technology has introduced an ever-increasing demand for large-scale reliable media services. This exposes the scalability limitations of curr...
Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimi...
155
Voted
CHI
2011
ACM
14 years 8 months ago
Interactive generator: a self-powered haptic feedback device
We present Interactive Generator (InGen), a self-powered wireless rotary input device capable of generating haptic or force feedback without the need for any external power source...
Akash Badshah, Sidhant Gupta, Gabe Cohn, Nicolas V...
« Prev « First page 2597 / 2698 Last » Next »