Sciweavers

859 search results - page 98 / 172
» The Changing Face of Cryptography
Sort
View
APSEC
2003
IEEE
14 years 3 months ago
Case study: Reconnaissance techniques to support feature location using RECON2
Change requests are often formulated into concepts or features that a maintainer can understand. One of the main issues faced by a maintainer is to know and locate “where does t...
Suhaimi Ibrahim, Norbik Bashah Idris, Aziz Deraman
IAT
2003
IEEE
14 years 3 months ago
Designing Flexible Negotiation Agent with Relaxed Decision Rules
This article presents a model for designing negotiation agent with two distinguishing features: 1) a marketdriven strategy and 2) a set of relaxed decision rules. Market-driven ag...
Kwang Mong Sim, Shi Yu Wang
IAT
2003
IEEE
14 years 3 months ago
Assistive Ecologies - Bio-mimetic Design Of Ambient Intelligence
Facing great challenges in designing better assistive technology with ever more complex and pervasive IT systems we need a general change in our understanding of designing IT. Way...
Mikkel Holm Sørensen
IV
2003
IEEE
148views Visualization» more  IV 2003»
14 years 3 months ago
Real-Time Expressive Rendering of City Models
City models have become central elements for visually communicating spatial information related to urban areas and have manifold applications. Our real-time orealistic rendering t...
Jürgen Döllner, Maike Walther
SRDS
2003
IEEE
14 years 3 months ago
Transparent Fault-Tolerant Java Virtual Machine
Replication is one of the prominent approaches for obtaining fault tolerance. Implementing replication on commodity hardware and in a transparent fashion, i.e., without changing t...
Roy Friedman, Alon Kama