Sciweavers

339 search results - page 60 / 68
» The Evolution of RFID Security
Sort
View
OOPSLA
2005
Springer
14 years 2 months ago
Pattern transformation for two-dimensional separation of concerns
Design patterns are applied in software development to decouple individual concerns, so that a change in a design decision is isolated to one location of the code base. However, m...
Xiaoqing Wu
OOPSLA
2004
Springer
14 years 1 months ago
A language-independent approach to software maintenance using grammar adapters
A long-standing goal of software engineering is to construct software that is easily modified and extended. Recent advances in software design techniques, such as aspect-oriented ...
Suman Roychoudhury
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
14 years 1 months ago
Displaying Aggregate Data, Interrelated Quantities, and Data Trends in Electric Power Systems
This paper describes a number of effective techniques for visualizing some of the more complex data relationships that characterize an electric power system in real time. Power sy...
Ray Klump, Warren Wu, Greg Dooley
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 1 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
DEXAW
2002
IEEE
133views Database» more  DEXAW 2002»
14 years 1 months ago
ESOW: Parallel/Distributed Programming on the Web
This paper presents an environment for supporting parallel/distributed programming using Java with RMI and RMI-IIOP (CORBA). The environment implements the notion of Shared Object...
Denivaldo Lopes, Slimane Hammoudi, Zair Abdelouaha...