Sciweavers

16725 search results - page 3135 / 3345
» Engineering Software Correctness
Sort
View
ARCS
2004
Springer
15 years 9 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
ARCS
2004
Springer
15 years 9 months ago
Heterogenous Data Fusion via a Probabilistic Latent-Variable Model
In a pervasive computing environment, one is facing the problem of handling heterogeneous data from different sources, transmitted over heterogeneous channels and presented on het...
Kai Yu, Volker Tresp
ARCS
2004
Springer
15 years 9 months ago
Latent Semantic Indexing in Peer-to-Peer Networks
Searching in decentralized peer-to-peer networks is a challenging problem. In common applications such as Gnutella, searching is performed by randomly forwarding queries to all pee...
Xuezheng Liu, Ming Chen, Guangwen Yang
ARCS
2004
Springer
15 years 9 months ago
The Value of Handhelds in Smart Environments
Abstract. The severe resource restrictions of computer-augmented everyday artifacts imply substantial problems for the design of applications in smart environments. Some of these p...
Frank Siegemund, Christian Floerkemeier, Harald Vo...
CAISE
2004
Springer
15 years 9 months ago
Towards Computer-aided Design of OCL Constraints
In UML2.0, significant efforts have been devoted towards a better definition of OCL. Still, the adoption of the language by the software engineers remains a significant challenge....
Yves Ledru, Sophie Dupuy-Chessa, Hind Fadil
« Prev « First page 3135 / 3345 Last » Next »