Sciweavers

4250 search results - page 774 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
ITCC
2005
IEEE
14 years 2 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
MMM
2005
Springer
185views Multimedia» more  MMM 2005»
14 years 2 months ago
Database Support for Haptic Exploration in Very Large Virtual Environments
The efficient management of complex objects has become an enabling technology for modern multimedia information systems as well as for many novel database applications. Unfortunat...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...
HIPC
2005
Springer
14 years 2 months ago
Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices
Several challenging new applications demand the ability to do data mining on resource constrained devices. One such application is that of monitoring physiological data streams ob...
Haimonti Dutta, Hillol Kargupta, Anupam Joshi
PROFES
2005
Springer
14 years 2 months ago
Framework for Integrating Usability Practices into the Software Process
Software development organizations wanting to introduce usability practices into their defined software process have to undertake laborious efforts for that purpose, since, for the...
Xavier Ferré, Natalia Juristo Juzgado, Ana ...
TBILLC
2005
Springer
14 years 2 months ago
Real World Multi-agent Systems: Information Sharing, Coordination and Planning
Abstract. Applying multi-agent systems in real world scenarios requires several essential research questions to be answered. Agents have to perceive their environment in order to t...
Frans C. A. Groen, Matthijs T. J. Spaan, Jelle R. ...