Sciweavers

2173 search results - page 121 / 435
» The Evolution of the DARWIN System
Sort
View
IJCINI
2007
112views more  IJCINI 2007»
13 years 9 months ago
Neo-Symbiosis: The Next Stage in the Evolution of Human Information Interaction
The purpose of this paper is to re-address the vision of human-computer symbiosis as originally expressed by J.C.R. Licklider nearly a half-century ago and to argue for the releva...
Douglas Griffith, Frank L. Greitzer
WCRE
2010
IEEE
13 years 7 months ago
Evaluating the Impact of Software Evolution on Software Clustering
—The evolution of a software project is a rich data source for analyzing and improving the software development process. Recently, several research groups have tried to cluster s...
Fabian Beck, Stephan Diehl
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 3 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
14 years 3 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
FASE
2007
Springer
14 years 3 months ago
EQ-Mine: Predicting Short-Term Defects for Software Evolution
We use 63 features extracted from sources such as versioning and issue tracking systems to predict defects in short time frames of two months. Our multivariate approach covers aspe...
Jacek Ratzinger, Martin Pinzger, Harald Gall