Sciweavers

1075 search results - page 146 / 215
» User's issues in crossmedia applications
Sort
View
IWSEC
2009
Springer
14 years 3 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
WETICE
2008
IEEE
14 years 3 months ago
Decentralized Network Analysis: A Proposal
In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, w...
Alberto Montresor
ICDCSW
2007
IEEE
14 years 3 months ago
Exploiting Gossip for Self-Management in Scalable Event Notification Systems
1 Challenges of scale have limited the development of event notification systems with strong properties, despite the urgent demand for consistency, reliability, security, and other...
Ken Birman, Anne-Marie Kermarrec, Krzysztof Ostrow...
ASSETS
2006
ACM
14 years 3 months ago
Designing a scripting language to help the blind program visually
The vast proliferation of GUI-based applications, including graphical interactive development environments (IDEs), has placed blind programmers at a severe disadvantage in a profe...
Kenneth G. Franqueiro, Robert M. Siegfried
ISQED
2005
IEEE
98views Hardware» more  ISQED 2005»
14 years 2 months ago
Wire Planning with Bounded Over-the-Block Wires
Hierarchical approach greatly facilitates large-scale chip design by hiding distracting details in low-level objects. However, the lowlevel designs have to have a global view of h...
Hua Xiang, I-Min Liu, Martin D. F. Wong