Sciweavers

8644 search results - page 1715 / 1729
» On the Composition of Secure Systems
Sort
View
TAPIA
2009
ACM
15 years 2 months ago
Research experiences for undergraduates: autonomic computing research at FIU
According to Computing Research Association, during each year between 2003 and 2007, fewer than 3% of the US’s Ph.D.s graduates in computer science and computer engineering were...
Masoud Milani, Seyed Masoud Sadjadi, Raju Rangaswa...
86
Voted
REFLECTION
2001
Springer
15 years 1 months ago
Performance and Integrity in the OpenORB Reflective Middleware
, are to address what we perceive as the most pressing shortcomings of current reflective middleware platforms. First, performance: in the worst case, this needs to be on a par wit...
Gordon S. Blair, Geoff Coulson, Michael Clarke, Ni...
79
Voted
ECBS
2000
IEEE
87views Hardware» more  ECBS 2000»
15 years 1 months ago
Limited Software Warranties
Because there are di erent types of software (e.g., language, application, target environment, etc.), di erent software certi cation methodologies are needed. Software process imp...
Jeffrey M. Voas
ASIACRYPT
2000
Springer
15 years 1 months ago
Cryptanalysis of the TTM Cryptosystem
Abstract. In 1985 Fell and Diffie proposed constructing trapdoor functions with multivariate equations [11]. They used several sequentially solved stages. Another idea of building ...
Louis Goubin, Nicolas Courtois
SIGGRAPH
1999
ACM
15 years 1 months ago
Multi-color and Artistic Dithering
A multi-color dithering algorithm is proposed, which converts a barycentric combination of color intensities into a multi-color nonoverlapping surface coverage. Multi-color dither...
Victor Ostromoukhov, Roger D. Hersch
« Prev « First page 1715 / 1729 Last » Next »