Sciweavers

709 search results - page 81 / 142
» In-stroke word completion
Sort
View
ICEIS
2008
IEEE
15 years 6 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
ICEIS
2008
IEEE
15 years 6 months ago
Tool Support for the Integration of Light-Weight Ontologies
In many areas of computer science ontologies become more and more important. The use of ontologies for domain modeling often brings up the issue of ontology integration. The task o...
Thomas Heer, Daniel Retkowitz, Bodo Kraft
RECONFIG
2008
IEEE
268views VLSI» more  RECONFIG 2008»
15 years 6 months ago
Parametric, Secure and Compact Implementation of RSA on FPGA
1 We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circuit especially intended for FPGAs on the low end of the price range. The desig...
Ersin Oksuzoglu, Erkay Savas
HAPTICS
2007
IEEE
15 years 6 months ago
Braille Display by Lateral Skin Deformation with the STReSS2 Tactile Transducer
Earlier work with a 1-D tactile transducer demonstrated that lateral skin deformation is sufficient to produce sensations similar to those felt when brushing a finger against a ...
Vincent Lévesque, Jérôme Pasqu...
VL
2007
IEEE
15 years 6 months ago
Evaluating an Automated Tool to Assist Evolutionary Document Generation
While using how-to documents for guidance in performing computer-based tasks, users often run into problems due to inaccurate, out-of-date and incomplete documentation. These prob...
Gahgene Gweon, Lawrence D. Bergman, Vittorio Caste...