Sciweavers

859 search results - page 98 / 172
» The Changing Face of Cryptography
Sort
View
133
Voted
APSEC
2003
IEEE
15 years 10 months ago
Case study: Reconnaissance techniques to support feature location using RECON2
Change requests are often formulated into concepts or features that a maintainer can understand. One of the main issues faced by a maintainer is to know and locate “where does t...
Suhaimi Ibrahim, Norbik Bashah Idris, Aziz Deraman
IAT
2003
IEEE
15 years 10 months ago
Designing Flexible Negotiation Agent with Relaxed Decision Rules
This article presents a model for designing negotiation agent with two distinguishing features: 1) a marketdriven strategy and 2) a set of relaxed decision rules. Market-driven ag...
Kwang Mong Sim, Shi Yu Wang
136
Voted
IAT
2003
IEEE
15 years 10 months ago
Assistive Ecologies - Bio-mimetic Design Of Ambient Intelligence
Facing great challenges in designing better assistive technology with ever more complex and pervasive IT systems we need a general change in our understanding of designing IT. Way...
Mikkel Holm Sørensen
IV
2003
IEEE
148views Visualization» more  IV 2003»
15 years 10 months ago
Real-Time Expressive Rendering of City Models
City models have become central elements for visually communicating spatial information related to urban areas and have manifold applications. Our real-time orealistic rendering t...
Jürgen Döllner, Maike Walther
SRDS
2003
IEEE
15 years 10 months ago
Transparent Fault-Tolerant Java Virtual Machine
Replication is one of the prominent approaches for obtaining fault tolerance. Implementing replication on commodity hardware and in a transparent fashion, i.e., without changing t...
Roy Friedman, Alon Kama