Sciweavers

5799 search results - page 993 / 1160
» Patterns Generate Architectures
Sort
View
118
Voted
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
15 years 8 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
132
Voted
WECWIS
2003
IEEE
90views ECommerce» more  WECWIS 2003»
15 years 8 months ago
A Web Agent for Automating E-Commerce Operations
The great amount of information that a user handles in their typical transactions on the Internet –identifiers, addresses, credit card numbers, among others-, makes it necessary...
Juan Raposo, Manuel Álvarez, Ángel V...
139
Voted
IUI
2003
ACM
15 years 8 months ago
Scripting embodied agents behaviour with CML: character markup language
Embodied agents present ongoing challenging agenda for research in multi-modal user interfaces and humancomputer-interaction. Such agent metaphors will only be widely applicable t...
Yasmine Arafa, E. H. Mamdani
153
Voted
MOBIDE
2003
ACM
15 years 8 months ago
Semantically driven service interoperability for pervasive computing
The common vision of pervasive computing environments requires a very large range of devices and software components to interoperate seamlessly. From the assumption that these dev...
Declan O'Sullivan, David Lewis
167
Voted
MSWIM
2003
ACM
15 years 8 months ago
Randomized location service in mobile ad hoc networks
Mobile Ad-Hoc Networks (MANETS) are networks of mobile nodes that do not have a fixed infrastructure. Recent research in this field addresses ways of solving existing problems i...
Sangeeta Bhattacharya