Sciweavers

145 search results - page 18 / 29
» Flow engineering for physical implementation: theory and pra...
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
14 years 11 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
SEAAI
1998
Springer
15 years 1 months ago
On theoretical backgrounds of CAD
Abstract. In the past, some information technologies (IT) have quickly been adopted by the engineering practice while the implementation of others has been slower. In the paper, th...
Ziga Turk
CANDC
2009
ACM
15 years 4 months ago
Nature of creative analogies in biologically inspired innovative design
Analogy is a fundamental process of creativity. Biologically inspired design by definition entails crossdomain analogies, and in practice has led to many innovative designs. Thus,...
Swaroop Vattam, Michael E. Helms, Ashok K. Goel
WCNC
2008
IEEE
15 years 4 months ago
On the Deployment of Mobile Trusted Modules
— In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpo...
Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper
UIST
2003
ACM
15 years 2 months ago
Synchronous gestures for multiple persons and computers
This research explores distributed sensing techniques for mobile devices using synchronous gestures. These are patterns of activity, contributed by multiple users (or one user wit...
Ken Hinckley