Sciweavers

COMPUTER
2008
52views more  COMPUTER 2008»
13 years 5 months ago
Remote Medical Monitoring
Andrew D. Jurik, Alfred C. Weaver
COMPUTER
2008
86views more  COMPUTER 2008»
13 years 5 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin
COMPUTER
2008
46views more  COMPUTER 2008»
13 years 5 months ago
Harnessing Digital Evolution
Philip K. McKinley, Betty H. C. Cheng, Charles Ofr...
COMPUTER
2008
90views more  COMPUTER 2008»
13 years 5 months ago
Activity Recognition for the Digital Home
Jeonghwa Yang, Bill N. Schilit, David W. McDonald
COMPUTER
2008
120views more  COMPUTER 2008»
13 years 5 months ago
On Attending Conferences
Raja Natarajan
COMPUTER
2008
92views more  COMPUTER 2008»
13 years 5 months ago
Can Programming Be Liberated, Period?
higher, more appropriate, level of abstraction. It still entails writing programs, usually by using symbols, keywords, and operational instructions to tell the computer what we wan...
David Harel
COMPUTER
2008
59views more  COMPUTER 2008»
13 years 5 months ago
An Assessment of Integrated Digital Cellular Automata Architectures
Victor V. Zhirnov, Ralph K. Cavin III, Greg Leemin...
COMPUTER
2008
43views more  COMPUTER 2008»
13 years 5 months ago
Turning Teenagers into Stores
Srijith Krishnan Nair, Ron Gerrits, Bruno Crispo, ...