Sciweavers

1398 search results - page 7 / 280
» The Real World Software Process
Sort
View
FSE
1997
Springer
131views Cryptology» more  FSE 1997»
13 years 12 months ago
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor
Most encryption algorithms are designed without regard to their performance on top-of-the-line microprocessors. This paper discusses general optimization principles algorithms desi...
Bruce Schneier, Doug Whiting
ARCS
2007
Springer
14 years 1 months ago
Architecture for Collaborative Business Items
Sensor network technology is pushing towards integration into the business world. By using sensor node hardware to augment real life business items it is possible to capture the wo...
Till Riedel, Christian Decker, Phillip Scholl, Alb...
IUI
2010
ACM
14 years 2 months ago
Automatically identifying targets users interact with during real world tasks
Information about the location and size of the targets that users interact with in real world settings can enable new innovations in human performance assessment and software usab...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff
KES
2007
Springer
14 years 1 months ago
Breedbot: An Edutainment Robotics System to Link Digital and Real World
The paper describes Breedbot an edutainment software and hardware system that could be used to evolve autonomous agents in digital (software) world and to transfer the evolved mind...
Orazio Miglino, Onofrio Gigliotta, Michela Pontico...
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 2 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis