Sciweavers

18155 search results - page 3433 / 3631
» Point
Sort
View
134
Voted
USENIX
2003
15 years 5 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
126
Voted
VCIP
2003
126views Communications» more  VCIP 2003»
15 years 5 months ago
Media handling for visual information retrieval in VizIR
This paper describes how the handling of visual media objects is implemented in the visual information retrieval project VizIR. Essentially, four areas are concerned: media access...
Horst Eidenberger
98
Voted
COLING
2000
15 years 5 months ago
Unscrambling English word order
We propose a treatment of `extraposition' which allows items to be assimilated directly even when they appear far from their canonical positions. This treatment supports anal...
Allan Ramsay, Helen Seville
128
Voted
ECIS
2000
15 years 5 months ago
Information Systems Research Education in Australasia: Continuing the Past or Gearing Up for the Future
As the information systems discipline grows, so do the number of programs offering graduate research degrees (GRD). In Australasia these include one year post-graduate (honors) pr...
Beverley G. Hope, M. Fergusson
168
Voted
FIW
1998
130views Communications» more  FIW 1998»
15 years 5 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
« Prev « First page 3433 / 3631 Last » Next »