Sciweavers

7839 search results - page 1378 / 1568
» What's there and what's not
Sort
View
SISW
2003
IEEE
15 years 6 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
WMCSA
2003
IEEE
15 years 6 months ago
A Historic Name-Trail Service
1 In this work we consider the mobility of personal online identifiers. People change the identifiers through which they are reachable on-line as they change jobs or residences ...
Petros Maniatis, Mary Baker
DIALM
2003
ACM
113views Algorithms» more  DIALM 2003»
15 years 6 months ago
Multicast time maximization in energy constrained wireless networks
We consider the problem of maximizing the lifetime of a given multicast connection in a wireless network of energyconstrained (e.g. battery-operated) nodes, by choosing ideal tran...
Patrik Floréen, Petteri Kaski, Jukka Kohone...
DOCENG
2003
ACM
15 years 6 months ago
Methods for the semantic analysis of document markup
We present an approach on how to investigate what kind of semantic information is regularly associated with the structural markup of scientific articles. This approach addresses ...
Petra Saskia Bayerl, Harald Lüngen, Daniela G...
ELPUB
2003
ACM
15 years 6 months ago
The Diversity of Trends, Experiences and Approaches in Electronic Publishing: Evidences of a Paradigm Shift on Communication
Electronic publishing constitutes one of the most exciting themes nowadays, amongst academics, at least, though substantial effects of IT usage for communication purposes in other...
Sely Maria de Souza Costa, Ana Cristina Moreira
« Prev « First page 1378 / 1568 Last » Next »