Sciweavers

16 search results - page 2 / 4
» ECRYPT: The Cryptographic Research Challenges for the Next D...
Sort
View
SIGSOFT
2010
ACM
13 years 3 months ago
Software for everyone by everyone
Given the dizzying pace of change in computer science, trying to look too far into the future of software engineering is hard. However, it might be possible to predict the future ...
Tevfik Bultan
CHI
2005
ACM
14 years 5 months ago
The future of user interface design tools
This workshop aims to gather researchers in the field of user interface design tools to identify important themes for the next decade of research. These tools aid in the design an...
Dan R. Olsen, Scott R. Klemmer
CIDR
2009
98views Algorithms» more  CIDR 2009»
13 years 6 months ago
From Declarative Languages to Declarative Processing in Computer Games
Recent work has shown that we can dramatically improve the performance of computer games and simulations through declarative processing: Character AI can be written in an imperati...
Ben Sowell, Alan J. Demers, Johannes Gehrke, Nitin...
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 5 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
SECRYPT
2010
214views Business» more  SECRYPT 2010»
13 years 3 months ago
Nanonetworks - A New Frontier in Communications
Nanotechnology is enabling the development of devices in a scale ranging from one to a few one hundred nanometers. Nanonetworks, i.e., the interconnection of nano-scale devices, a...
Ian F. Akyildiz