Sciweavers

663 search results - page 69 / 133
» PKI design for the real world
Sort
View
IISWC
2008
IEEE
15 years 6 months ago
On the representativeness of embedded Java benchmarks
— Java has become one of the predominant languages for embedded and mobile platforms due to its architecturally neutral design, portability, and security. But Java execution in t...
Ciji Isen, Lizy Kurian John, Jung Pil Choi, Hyo Ju...
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
15 years 5 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
HT
2000
ACM
15 years 4 months ago
The travails of visually impaired web travellers
This paper proposes the inclusion of travel and mobility in the usability metrics of web design. Hypertext design and usability has traditionally concentrated upon navigation and/...
Carole A. Goble, Simon Harper, Robert Stevens
DATE
2004
IEEE
109views Hardware» more  DATE 2004»
15 years 3 months ago
RTL Processor Synthesis for Architecture Exploration and Implementation
Architecture description languages are widely used to perform architecture exploration for application-driven designs, whereas the RT-level is the commonly accepted level for hard...
Oliver Schliebusch, Anupam Chattopadhyay, Rainer L...
ICSE
2012
IEEE-ACM
13 years 2 months ago
Characterizing logging practices in open-source software
—Software logging is a conventional programming practice. While its efficacy is often important for users and developers to understand what have happened in the production run, ...
Ding Yuan, Soyeon Park, Yuanyuan Zhou