Sciweavers

623 search results - page 80 / 125
» Velocity-Dependent Dynamic Manipulability
Sort
View
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
CAISE
2003
Springer
15 years 9 months ago
An Adaptive Document Version Management Scheme
This paper addresses the design and implementation of an adaptive document version management scheme. Existing schemes typically assume: (i) a priori expectations for how versions ...
Boualem Benatallah, Mehregan Mahdavi, Phuong Nguye...
ICSM
2002
IEEE
15 years 8 months ago
STA - A Conceptual Model for System Evolution
A great deal of work on software maintenance focuses on source code analysis and manipulation. Code is viewed as a static entity that is – more or less – separated from the sy...
Markus Pizka
NIME
2001
Springer
205views Music» more  NIME 2001»
15 years 8 months ago
Musical Trinkets
Passive RF Tagging can provide an attractive medium for development of free-gesture musical interfaces. This was initially explored in our Musical Trinkets installation, which use...
Joseph A. Paradiso
ADBIS
2000
Springer
97views Database» more  ADBIS 2000»
15 years 8 months ago
An Efficient Storage Manager
When dealing with large quantities of clauses, the use of persistent knowledge is inevitable, and indexing methods are essential to answer queries efficiently. We introduce PerKMan...
Dimitris G. Kapopoulos, Michael Hatzopoulos, Panag...