Sciweavers

6300 search results - page 133 / 1260
» We have it easy, but do we have it right
Sort
View
DRMTICS
2005
Springer
15 years 7 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
COMCOM
2004
117views more  COMCOM 2004»
15 years 1 months ago
The case for interdomain dynamic QoS-based service negotiation in the internet
The evolution of the Internet towards a global infrastructure for real time voice and video applications involves providing stringent Quality of Service (QoS) levels. Although som...
Carlos Alberto Kamienski, Djamel Sadok
CHI
2006
ACM
16 years 1 months ago
Tabletop sharing of digital photographs for the elderly
We have recently begun to see hardware support for the tabletop user interface, offering a number of new ways for humans to interact with computers. Tabletops offer great potentia...
Trent Apted, Judy Kay, Aaron J. Quigley
OSDI
2002
ACM
16 years 1 months ago
CMC: A Pragmatic Approach to Model Checking Real Code
Many system errors do not emerge unless some intricate sequence of events occurs. In practice, this means that most systems have errors that only trigger after days or weeks of ex...
Madanlal Musuvathi, David Y. W. Park, Andy Chou, D...
EDCC
1999
Springer
15 years 5 months ago
Dependability Modelling and Sensitivity Analysis of Scheduled Maintenance Systems
Abstract. In this paper we present a new modelling approach for dependability evaluation and sensitivity analysis of Scheduled Maintenance Systems, based on a Deterministic and Sto...
Andrea Bondavalli, Ivan Mura, Kishor S. Trivedi