Sciweavers

244 search results - page 33 / 49
» Group Corings
Sort
View
132
Voted
ITICSE
2006
ACM
15 years 6 months ago
Foundational actions: teaching software engineering when time is tight
Often Software Engineering courses approach educating undergraduates in good processes and practices by using a simulated product development environment, following all of the ste...
Jerry Boetje
PEWASUN
2005
ACM
15 years 6 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
105
Voted
FSE
2005
Springer
112views Cryptology» more  FSE 2005»
15 years 6 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda
83
Voted
JCDL
2004
ACM
112views Education» more  JCDL 2004»
15 years 5 months ago
Metaextract: an NLP system to automatically assign metadata
We have developed MetaExtract, a system to automatically assign Dublin Core + GEM metadata using extraction techniques from our natural language processing research. MetaExtract i...
Ozgur Yilmazel, Christina M. Finneran, Elizabeth D...
MOZ
2004
Springer
15 years 5 months ago
An Interactive Tool for the Controlled Execution of an Automated Timetabling Constraint Engine
Abstract. Here we introduce DePathos, a graphical tool for a timetabling constraint engine (Pathos). Since the core of Pathos is textbased and provides little user-interaction, fi...
Alberto Delgado, Jorge Andrés Pérez,...