Sciweavers

1172 search results - page 155 / 235
» Who killed design
Sort
View
CCS
2001
ACM
14 years 2 months ago
Delegation of cryptographic servers for capture-resilient devices
Abstract. A device that performs private key operations (signatures or decryptions), and whose private key operations are protected by a password, can be immunized against offline...
Philip D. MacKenzie, Michael K. Reiter
ICSE
2001
IEEE-ACM
14 years 2 months ago
Improving Software Inspections by Using Reading Techniques
Reading techniques are step-by-step procedures that guide individual inspectors while they uncover defects in a software artifact. Reading techniques provide a systematic and well...
Forrest Shull, Ioana Rus, Victor R. Basili
MICCAI
2001
Springer
14 years 2 months ago
TER: A System for Robotic Tele-echography
The quality of ultrasound based diagnosis highly depends on the operator’s skills. Some healthcare centres may not have the required medical experts on hand when needed and there...
Adriana Vilchis Gonzales, Philippe Cinquin, Jocely...
VLDB
2001
ACM
86views Database» more  VLDB 2001»
14 years 2 months ago
Intelligent Rollups in Multidimensional OLAP Data
In this paper we propose a new operator for advanced exploration of large multidimensional databases. The proposed operator can automatically generalize from a specific problem c...
Gayatri Sathe, Sunita Sarawagi
AGENTS
2000
Springer
14 years 2 months ago
Interactive pedagogical drama
This paper describes an agent-based approach to realizing interactive pedagogical drama. Characters choose their actions autonomously, while director and cinematographer agents ma...
Stacy Marsella, W. Lewis Johnson, Catherine LaBore