Sciweavers

1949 search results - page 104 / 390
» Protective Interface Specifications
Sort
View
BCSHCI
2007
13 years 11 months ago
A toolkit approach to sketched diagram recognition
Sketch-based tools provide a more human centered design environment than traditional widget-based computer design software. A number of sketch tools exist that support specific de...
Beryl Plimmer, Isaac Freeman
WSC
1998
13 years 11 months ago
The DoD High Level Architecture: an update
The High Level Architecture (HLA) provides the specification of a common technical architecture for use across all classes of simulations in the US Department of Defense. It provi...
Judith S. Dahmann, Richard Fujimoto, Richard M. We...
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
14 years 3 days ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
PERCOM
2005
ACM
14 years 9 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
AIPS
1994
13 years 11 months ago
Design Tradeoffs in Partial Order (Plan space) Planning
Despite the long history of classical planning, there has been very little comparative analysis of the performance tradeoffs offered by the multitude of existing planning algorith...
Subbarao Kambhampati