Sciweavers

3825 search results - page 12 / 765
» The Language of Time: A Reader
Sort
View
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
14 years 3 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine

Book
407views
15 years 4 months ago
Java Gently
"Java Gently teaches the reader how to program and how to do it in the best possible style in Java. In the process, it details the fundamental structures of the Java 2 languag...
Judy Bishop
CORR
2006
Springer
80views Education» more  CORR 2006»
13 years 8 months ago
Mental Representations Constructed by Experts and Novices in Object-Oriented Program Comprehension
Previous studies on program comprehension were carried out largely in the context of procedural languages. Our purpose is to develop and evaluate a cognitive model of object-orient...
Jean-Marie Burkhardt, Françoise Déti...
VEE
2012
ACM
255views Virtualization» more  VEE 2012»
12 years 4 months ago
Adding dynamically-typed language support to a statically-typed language compiler: performance evaluation, analysis, and tradeof
Applications written in dynamically typed scripting languages are increasingly popular for Web software development. Even on the server side, programmers are using dynamically typ...
Kazuaki Ishizaki, Takeshi Ogasawara, José G...
EUC
2005
Springer
14 years 1 months ago
Wireless RFID Networks for Real-Time Customer Relationship Management
A new system for real-time customer relationship management is proposed. The system is based on deploying a network of RFID readers throughout an environment. Information about the...
C. Philipp Schloter, Hamid K. Aghajan