Sciweavers

2878 search results - page 574 / 576
» Analyzing the Uses of a Software Modeling Tool
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 22 days ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
PERVASIVE
2010
Springer
13 years 7 months ago
Specification and Verification of Complex Location Events with Panoramic
We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce o...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
3DPH
2009
207views Healthcare» more  3DPH 2009»
13 years 6 months ago
A 3D Human Brain Atlas
3D representations of human physiology provide interesting options in the field of education. Understanding the human brain seems to be much easier when the anatomical structure is...
Sebastian Thelen, Jörg Meyer, Achim Ebert, Ha...
SIGADA
2001
Springer
13 years 10 months ago
Electronic maneuvering board and dead reckoning tracer decision aid for the officer of the deck
Statement and AbstractProblem Statement and AbstractProblem Statement and AbstractProblem Statement and Abstract The U.S. Navy currently bases the majority of our contact managemen...
Kenneth L. Ehresman, Joey L. Frantzen
WWW
2009
ACM
14 years 6 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...