Sciweavers

3922 search results - page 774 / 785
» The IA-64 Architecture at Work
Sort
View
TC
2008
14 years 9 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
INFSOF
2007
126views more  INFSOF 2007»
14 years 9 months ago
Software maintenance seen as a knowledge management issue
Creating and maintaining software systems is a knowledge intensive task. One needs to have a good understanding of the application domain, the problem to solve and all its require...
Nicolas Anquetil, Káthia Marçal de O...
62
Voted
AROBOTS
2005
93views more  AROBOTS 2005»
14 years 9 months ago
A Simple Robotic System for Neurorehabilitation
In the recent past, several researchers have shown that important variables in relearning motor skills and in changing the underlying neural architecture after stroke are the quant...
Silvestro Micera, Maria Chiara Carrozza, Eugenio G...
TISSEC
2008
235views more  TISSEC 2008»
14 years 9 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
TOG
2008
293views more  TOG 2008»
14 years 9 months ago
A perceptually validated model for surface depth hallucination
Capturing detailed surface geometry currently requires specialized equipment such as laser range scanners, which despite their high accuracy, leave gaps in the surfaces that must ...
Mashhuda Glencross, Gregory J. Ward, Francho Melen...