Sciweavers

9218 search results - page 1792 / 1844
» RFID Technology and Applications
Sort
View
DRM
2006
Springer
15 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ECOOP
2006
Springer
15 years 1 months ago
Demeter Interfaces: Adaptive Programming Without Surprises
Adaptive Programming (AP) allows for the separate definition of data structures and traversals with attached computations, performed during the traversal, that operate on these dat...
Therapon Skotiniotis, Jeffrey Palm, Karl J. Lieber...
ECOOPW
2006
Springer
15 years 1 months ago
AOSD and Reflection: Benefits and Drawbacks to Software Evolution
Following last two years' RAM-SE (Reflection, AOP and Meta-Data for Software Evolution) workshop at the ECOOP conference, the RAM-SE 2006 workshop was a successful and popular...
Walter Cazzola, Shigeru Chiba, Yvonne Coady, Gunte...
ECTEL
2006
Springer
15 years 1 months ago
Blended Learning Concepts - a Short Overview
This paper presents a short overview of blended learning, showing arguments for and against these concepts. Potential blended learning scenarios are described that vary depending o...
Sonja Trapp
EMSOFT
2006
Springer
15 years 1 months ago
Time-triggered implementations of dynamic controllers
Bridging the gap between model-based design and platformbased implementation is one of the critical challenges for embedded software systems. In the context of embedded control sy...
Truong Nghiem, George J. Pappas, Rajeev Alur, Anto...
« Prev « First page 1792 / 1844 Last » Next »