Sciweavers

7623 search results - page 1257 / 1525
» Constructive Volume Modeling
Sort
View
ICSE
2007
IEEE-ACM
16 years 4 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
ICSE
2008
IEEE-ACM
16 years 4 months ago
The economy of collective attention for situated knowledge collaboration in software development
Because the knowledge required for the construction of a complex software system is often widely distributed among its members, programmers routinely engage in collaboration with ...
Yunwen Ye, Kumiyo Nakakoji, Yasuhiro Yamamoto
ICFP
2007
ACM
16 years 4 months ago
Adding delimited and composable control to a production programming environment
Operators for delimiting control and for capturing composable continuations litter the landscape of theoretical programming language research. Numerous papers explain their advant...
Matthew Flatt, Gang Yu, Robert Bruce Findler, Matt...
MOBISYS
2007
ACM
16 years 4 months ago
Algorithm to automatically detect abnormally long periods of inactivity in a home
An algorithm has been developed to automatically construct individual models of normal activity within a home using motion sensor data. Alerts can be generated when a period of in...
Paul Cuddihy, Jenny Weisenberg, Catherine Graichen...
DCC
2008
IEEE
16 years 4 months ago
A synthetic indifferentiability analysis of some block-cipher-based hash functions
At ASIACRYPT 2006, Chang et al. analyzed the indifferentiability of some popular hash functions based on block ciphers, namely, the twenty collision resistant PGV, the MDC2 and th...
Zheng Gong, Xuejia Lai, Kefei Chen
« Prev « First page 1257 / 1525 Last » Next »