Sciweavers

3389 search results - page 648 / 678
» Perspectives on system identification
Sort
View
CCS
2001
ACM
14 years 11 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ACMDIS
2000
ACM
14 years 6 days ago
Contextual Prototyping of User Interfaces
Contextual development differs from traditional user interface development in several ways: It focuses on the context of usage and the user population rather than on the technical...
Christian Stary
SIGUCCS
2000
ACM
14 years 6 days ago
Implementing LIES (Location Independent Email Service)
This paper will provide a useful guide to those schools that have not yet implemented IMAP and are considering doing so. With both the systems and user services perspectives, any ...
Pamela Vogel, John Spadaro
DAC
1999
ACM
14 years 5 days ago
Cycle and Phase Accurate DSP Modeling and Integration for HW/SW Co-Verification
We present our practical experience in the modeling and integration of cycle/phase-accurate instruction set architecture (ISA) models of digital signal processors (DSPs) with othe...
Lisa M. Guerra, Joachim Fitzner, Dipankar Talukdar...
ERCIMDL
1998
Springer
174views Education» more  ERCIMDL 1998»
14 years 2 days ago
Intelligent Multimedia Communication
Multimedia communication is a part of everyday life and its appearance in computer applications is increasing in frequency and diversity. Intelligent or knowledge based computer su...
Mark T. Maybury, Oliviero Stock, Wolfgang Wahlster