Sciweavers

5722 search results - page 227 / 1145
» Security Function Interactions
Sort
View
CCS
2008
ACM
15 years 5 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
CHI
2008
ACM
16 years 3 months ago
In-car interaction using search-based user interfaces
Increasing functionality, growing media volumes and dynamic data in today's in-vehicle information systems bear new challenges for user interaction design. Traditional hierar...
Stefan Graf, Wolfgang Spiessl, Albrecht Schmidt, A...
IFIP13
2004
15 years 4 months ago
Analysing Dynamic Function Scheduling Decisions
: Function allocation, as a process used in the construction of dependable complex systems, is a significant aspect of the design and implementation of interactive systems. It invo...
Karsten Loer, Michael Hildebrandt, Michael D. Harr...
ECSA
2010
Springer
15 years 4 months ago
Functional Architecture Modeling for the Software Product Industry
Although a lot of research has been carried out on the technical architecture of software systems, the domain of Functional Architecture in the software product industry lacks a fo...
Sjaak Brinkkemper, Stella Pachidi
WSCG
2004
121views more  WSCG 2004»
15 years 4 months ago
User-Centric Transfer Function Specification in Augmented Reality
The quality of a 3D volume visualization heavily depends on a representative transfer function which is responsible for mapping the original density values to color and opacity. F...
Bernhard Reitinger, Christopher Zach, Alexander Bo...