Sciweavers

1801 search results - page 321 / 361
» Software Patterns in ITS Architectures
Sort
View
HOTOS
2003
IEEE
15 years 5 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
CASES
2003
ACM
15 years 5 months ago
AES and the cryptonite crypto processor
CRYPTONITE is a programmable processor tailored to the needs of crypto algorithms. The design of CRYPTONITE was based on an in-depth application analysis in which standard crypto ...
Dino Oliva, Rainer Buchty, Nevin Heintze
EICS
2010
ACM
15 years 4 months ago
User interface plasticity: model driven engineering to the limit!
Ten years ago, I introduced the notion of user interface plasticity to denote the capacity of user interfaces to adapt, or to be adapted, to the context of use while preserving us...
Joëlle Coutaz
CA
2002
IEEE
15 years 4 months ago
Specifying MPEG-4 Body Behaviors
The MPEG-4 standard specifies a set of low-level animation parameters for body animation, but does not provide any high-level functionality for the control of avatars or embodied...
Anthony Guye-Vuillème, Daniel Thalmann
CONTEXT
2001
Springer
15 years 4 months ago
A Connectionist-Symbolic Approach to Modeling Agent Behavior: Neural Networks Grouped by Contexts
A recent report by the National Research Council (NRC) declares neural networks “hold the most promise for providing powerful learning models”. While some researchers have expe...
Amy E. Henninger, Avelino J. Gonzalez, Michael Geo...