Sciweavers

1605 search results - page 294 / 321
» An XML implementation process model for enterprise applicati...
Sort
View
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 6 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
15 years 6 months ago
Supporting Knowledge Transfer through Decomposable Reasoning Artifacts
Technology to support knowledge transfer and cooperative inquiry must offer its users the ability to effectively interpret knowledge structures produced by collaborators. Communic...
William Pike, Richard May, Alan Turner
ICCCN
2007
IEEE
15 years 6 months ago
Signaling Transport Options in GMPLS Networks: In-band or Out-of-band
—Signaling protocols for GMPLS networks have been standardized and implemented in switch controllers. Most switch vendors allow for signaling messages to be carried over inband s...
Malathi Veeraraghavan, Tao Li
IPPS
2007
IEEE
15 years 6 months ago
Speedup using Flowpaths for a Finite Difference Solution of a 3D Parabolic PDE
Partial differential equations (PDEs) are used to model physical phenomena and then appropriate convergent numerical algorithms are employed to solve them and create computer simu...
Darrin M. Hanna, Anna M. Spagnuolo, Michael DuChen...
ICCS
2007
Springer
15 years 6 months ago
AIMSS: An Architecture for Data Driven Simulations in the Social Sciences
Abstract. This paper presents a prototype implementation of an intelligent assistance architecture for data-driven simulation specialising in qualitative data in the social science...
Catriona Kennedy, Georgios K. Theodoropoulos, Volk...