Sciweavers

3006 search results - page 175 / 602
» Overview
Sort
View
132
Voted
DAC
1999
ACM
15 years 7 months ago
Dynamically Reconfigurable Architecture for Image Processor Applications
This work presents an overview of the principles that underlie the speed-up achievable by dynamic hardware reconfiguration, proposes a more precise taxonomy for the execution mode...
Alexandro M. S. Adário, Eduardo L. Roehe, S...
125
Voted
DEXAW
1999
IEEE
98views Database» more  DEXAW 1999»
15 years 7 months ago
Shaping the Research Agenda for Security in E-Commerce
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Rolf Oppliger
112
Voted
ICEIS
1999
IEEE
15 years 7 months ago
A Method for Integrating Legacy Systems within Distributed Object Architecture
: The ability of a new technology to reuse legacy systems is very important for its economic success. This paper presents a method for integrating legacy systems within distributed...
Matjaz B. Juric, Ivan Rozman, Marjan Hericko
129
Voted
CQRE
1999
Springer
15 years 7 months ago
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP link. In response to [SM98], Microsoft released extensions to the PPTP authentication me...
Bruce Schneier, Mudge, David Wagner
ISWC
1999
IEEE
15 years 7 months ago
Asymmetries in Collaborative Wearable Interfaces
Communication asymmetries are inherent in collaborative dialogues between wearable computer and desktop users. This paper gives a definition and overview of what communication asy...
Mark Billinghurst, Simon Bee, Jerry Bowskill, Hiro...