Sciweavers

1136 search results - page 140 / 228
» A case for the accountable cloud
Sort
View
STEP
2003
IEEE
15 years 4 months ago
Incorporating Quality Requirements in Software Migration Process
The reengineering of legacy software systems to modern Object Oriented platforms has received significant attention over the past few years. However, most often the reengineering ...
Ying Zou
CAEPIA
2003
Springer
15 years 4 months ago
Clustering Main Concepts from e-Mails
E–mail is one of the most common ways to communicate, assuming, in some cases, up to 75% of a company’s communication, in which every employee spends about 90 minutes a day in ...
Jesús S. Aguilar-Ruiz, Domingo S. Rodr&iacu...
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
15 years 4 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
ICALP
2003
Springer
15 years 4 months ago
Quantitative Analysis of Probabilistic Lossy Channel Systems
Many protocols are designed to operate correctly even in the case where the underlying communication medium is faulty. To capture the behaviour of such protocols, lossy channel sy...
Alexander Moshe Rabinovich
IS4TH
2003
Springer
15 years 4 months ago
Haptic Simulation of a Tool in Contact with a Nonlinear Deformable Body
This paper presents a method to artificially re-create haptic feedback while moving and sliding an arbitrary virtual tool against a virtual deformable body with nonlinear elastic ...
Mohsen Mahvash, Vincent Hayward