Sciweavers

9581 search results - page 222 / 1917
» On Ubiquitous Integrated Computing
Sort
View
157
Voted
EUC
2005
Springer
15 years 11 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
GI
2003
Springer
15 years 10 months ago
Interaktion als Dienst in Mundo
Abstract: Beim Ubiquitous Computing sollen unz¨ahlige verschiedene Ger¨ate in spontaner Kooperation Dienste auf intelligente und benutzerfreundliche Weise erbringen. Ein Dienst k...
Elmar Braun, Erwin Aitenbichler
ITICSE
2000
ACM
15 years 9 months ago
Enter the usability engineer: integrating HCI and software engineering
This paper examines the role of Human Computer Interaction in the context of the Computer Science and Software Engineering curricula. We suggest there needs to be much more integr...
Xristine Faulkner, Fintan Culwin
CSREASAM
2006
15 years 6 months ago
Adaptive Security Metrics for Computer Systems
The major concern for a computer system is its security and integrity. It is necessary to check the security level of your system and keep it updated. This can be best achieved by ...
Satish Baddelpeli, Gregory Vert
VLDB
1993
ACM
116views Database» more  VLDB 1993»
15 years 9 months ago
Algebraic Optimization of Computations over Scientific Databases
Although scientific data analysis increasingly requires accessandmanipulation of large quantitiesof data,current databasetechnology fails to meet the needsof scientific processing...
Richard H. Wolniewicz, Goetz Graefe