Sciweavers

786 search results - page 75 / 158
» A Software System for Secure Computer Aided Exams
Sort
View
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
15 years 8 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
WS
2006
ACM
15 years 5 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
DAGSTUHL
2001
15 years 1 months ago
A Language and System for Constructing and Presenting Low Fidelity Algorithm Visualizations
Computer science educators have traditionally used algorithm visualization (AV) software to create graphical representations of algorithms that are later used as visual aids in lec...
Christopher D. Hundhausen, Sarah A. Douglas
IJNSEC
2008
135views more  IJNSEC 2008»
14 years 12 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
JUCS
2008
187views more  JUCS 2008»
14 years 11 months ago
Semantic Information in Medical Information Systems: Utilization of Text Mining Techniques to Analyze Medical Diagnoses
: Most information in Hospitals is still only available in text format and the amount of this data is immensely increasing. Consequently, text mining is an essential area of medica...
Andreas Holzinger, Regina Geierhofer, Felix Mö...