Sciweavers

6300 search results - page 33 / 1260
» We have it easy, but do we have it right
Sort
View
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
14 years 2 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
TOG
2012
245views Communications» more  TOG 2012»
11 years 11 months ago
How do humans sketch objects?
Humans have used sketching to depict our visual world since prehistoric times. Even today, sketching is possibly the only rendering technique readily available to all humans. This...
Mathias Eitz, James Hays, Marc Alexa
ARCS
2006
Springer
14 years 8 days ago
Do Trace Cache, Value Prediction and Prefetching Improve SMT Throughput?
While trace cache, value prediction, and prefetching have been shown to be effective in the single-threaded superscalar, there has been no analysis of these techniques in a Simulta...
Chen-Yong Cher, Il Park, T. N. Vijaykumar
ISPEC
2007
Springer
14 years 2 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
RE
2007
Springer
14 years 2 months ago
Requirements in the wild: How small companies do it
Small companies form a large part of the software industry, but have mostly been overlooked by the requirements engineering research community. We know very little about the techn...
Jorge Aranda, Steve M. Easterbrook, Greg Wilson