Sciweavers

1428 search results - page 205 / 286
» aims 2010
Sort
View
BPM
2010
Springer
147views Business» more  BPM 2010»
14 years 7 months ago
From People to Services to UI: Distributed Orchestration of User Interfaces
Traditionally, workflow management systems aim at alleviating people's burden of coordinating repetitive business procedures, i.e., they coordinate people. Web service orchest...
Florian Daniel, Stefano Soi, Stefano Tranquillini,...
CANS
2010
Springer
197views Cryptology» more  CANS 2010»
14 years 7 months ago
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
The SHA-3 competition organized by NIST [1] aims to find a new hash standard as a replacement of SHA-2. Till now, 14 submissions have been selected as the second round candidates, ...
Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
14 years 7 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
CGO
2010
IEEE
14 years 7 months ago
On improving heap memory layout by dynamic pool allocation
Dynamic memory allocation is widely used in modern programs. General-purpose heap allocators often focus more on reducing their run-time overhead and memory space utilization, but...
Zhenjiang Wang, Chenggang Wu, Pen-Chung Yew
CHI
2010
ACM
14 years 7 months ago
Trying too hard: effects of mobile agents' (Inappropriate) social expressiveness on trust, affect and compliance
Mobile services can provide users with information relevant to their current circumstances. Distant services in turn can acquire local information from people in an area of intere...
Henriette S. M. Cramer, Vanessa Evers, Tim van Slo...