Sciweavers

44 search results - page 6 / 9
» From PIMs to PSMs
Sort
View
FCT
2009
Springer
15 years 4 months ago
Computing Role Assignments of Chordal Graphs
In social network theory, a simple graph G is called k-role assignable if there is a surjective mapping that assigns a number from {1, . . . , k} called a role to each vertex of G ...
Pim van 't Hof, Daniël Paulusma, Johan M. M. ...
MHCI
2009
Springer
15 years 4 months ago
The use of mobile contact list applications and a context-oriented framework to support their design
Contact lists are one of the most frequently used applications on mobile devices. They are used not only as contact detail repositories, but also as temporary information storage ...
Andreas Komninos, Dimitrios Liarokapis
HOST
2009
IEEE
15 years 1 months ago
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
A PUF or Physical Unclonable Function is a function that is embodied in a physical structure that consists of many random uncontrollable components which originate from process var...
Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schelleke...
JSW
2007
123views more  JSW 2007»
14 years 9 months ago
A Taxonomy for a Constructive Approach to Software Evolution
Abstract— In many software design and evaluation techniques, either the software evolution problem is not systematically elaborated, or only the impact of evolution is considered...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
SP
2009
IEEE
15 years 4 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel