Sciweavers

948 search results - page 148 / 190
» Designing technology for community appropriation
Sort
View
63
Voted
ICSE
2001
IEEE-ACM
15 years 3 months ago
Conceptual Modeling through Linguistic Analysis Using LIDA
Despite the advantages that object technology can provide to the software development community and its customers, the fundamental problems associated with identifying objects, th...
Scott P. Overmyer, Benoit Lavoie, Owen Rambow
ACSAC
2004
IEEE
15 years 2 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
ACMSE
2008
ACM
15 years 1 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
EIT
2008
IEEE
15 years 26 days ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
LREC
2010
171views Education» more  LREC 2010»
15 years 16 days ago
LAT Bridge: Bridging Tools for Annotation and Exploration of Rich Linguistic Data
We present a software module, the LAT Bridge, which enables bidirectional communication between the annotation and exploration tools developed at the Max Planck Institute for Psyc...
Marc Kemps-Snijders, Thomas Koller, Han Sloetjes, ...