Sciweavers

18155 search results - page 3491 / 3631
» Point
Sort
View
CEE
2007
110views more  CEE 2007»
15 years 1 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...
CG
2007
Springer
15 years 1 months ago
An evaluation of user experience with a sketch-based 3D modeling system
With the availability of pen-enabled digital hardware, sketch-based 3D modeling is becoming an increasingly attractive alternative to traditional methods in many design environmen...
Levent Burak Kara, Kenji Shimada, Sarah D. Marmale...
IJSI
2008
91views more  IJSI 2008»
15 years 1 months ago
Random Event Structures
Abstract In a line of recent development, probabilistic constructions of universal, homogeneous objects have been provided in various categories of ordered structures, such as caus...
Manfred Droste, Guo-Qiang Zhang
IEEESP
2006
108views more  IEEESP 2006»
15 years 1 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
CGF
2007
158views more  CGF 2007»
15 years 1 months ago
Manipulating, Deforming and Animating Sampled Object Representations
A sampled object representation (SOR) defines a graphical model using data obtained from a sampling process, which takes a collection of samples at discrete positions in space in...
Min Chen, Carlos D. Correa, Shoukat Islam, Mark W....
« Prev « First page 3491 / 3631 Last » Next »