Sciweavers

270 search results - page 29 / 54
» Building Software Securely from the Ground Up
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 5 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
ATAL
2008
Springer
14 years 12 months ago
A domain specific modeling language for multiagent systems
Software systems are becoming more and more complex with a large number of interacting partners often distributed over a network. A common dilemma faced by software engineers in b...
Christian Hahn
COMPSAC
2007
IEEE
15 years 4 months ago
Towards Requirements Engineering for Context Adaptive Systems
Building realistic end user scenarios for ubiquitous computing applications entails large up-front investments. Many context adaptive applications so far fail to live up to their ...
Wassiou Sitou, Bernd Spanfelner
AUIC
2002
IEEE
15 years 2 months ago
The Tinmith System - Demonstrating New Techniques for Mobile Augmented Reality Modelling
This paper presents user interface technology, using a glove based menuing system and 3D interaction techniques. It is designed to support applications that allow users to constru...
Wayne Piekarski, Bruce H. Thomas
EUROMICRO
2004
IEEE
15 years 1 months ago
Towards an Event-Driven Workplace for Knowledge Integration
A contemporary office or knowledge worker has to deal with an ever increasing number of information channels and associated flows of events (i.e., software applications using vary...
Alexander Schatten, Stefan Biffl