Search

Showing total 71,221 results

Search Constraints

Start Over You searched for: Topic computer Remove constraint Topic: computer Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
71,221 results

Search Results

2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models

12. Hostile Blockchain Takeovers (Short Paper)

13. An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature

14. Item Differential in Computer Based and Paper Based Versions of a High Stakes Tertiary Entrance Test: Diagrams and the Problem of Annotation

15. A Short Paper on the Incentives to Share Private Information for Population Estimates

16. Survey of Pen-and-Paper Computing

17. Users Can Do Better with PDAs Than Paper: A Usability Study of PDA-Based vs. Paper-Based Nursing Documentation Systems

18. Evaluating Paper Prototype for Tabletop Collaborative Game Applications

19. ECOTRUCK: An Agent System for Paper Recycling

20. Study on the Application of RFID Technology in the Management System of Paper Machine’s Disassembly and Assembly

21. An Intelligent Shopping List - Combining Digital Paper with Product Ontologies

22. Coding a Simulation Model of the 3D Structure of Paper

23. Towards Secure Bioinformatics Services (Short Paper)

24. Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)

25. Fast Embedding Technique for Dirty Paper Trellis Watermarking

26. Tactile Paper Prototyping with Blind Subjects

27. Virtual Artistic Paper-Cut

28. An Evaluation Framework for Analytical Methods of Integrating Electronic Word-of-Mouth Information: Position Paper

29. A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)

30. Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)

31. The Research and Application of Fuzzy Entropy Weight Comprehensive Evaluation Method in Paper Quality Evaluation

32. Advanced Paper Document in a Projection Display

33. Paper on the Move

34. A Short Paper on Blind Signatures from Knowledge Assumptions

35. Private eCash in Practice (Short Paper)

36. A Position Paper on ’Living Laboratories’: Rethinking Ecological Designs and Experimentation in Human-Computer Interaction

37. Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)

38. An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)

39. A Robust and Secure RFID-Based Pedigree System (Short Paper)

40. Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)

41. Working Group I — Requirements and Applications — Position Paper: Requirements for 3D in Geographic Information Systems Applications

42. Distilling Scenarios from Patterns for Software Architecture Evaluation – A Position Paper

43. What is the Best Way to Allocate Teacher’s Efforts: How Accurately Should We Write on the Board? When Marking Comments on Student Papers?

44. Pragmatic Aspects of Reusable Program Generators Position Paper

45. DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)

46. KBID: Kerberos Bracelet Identification (Short Paper)

47. Executable and Symbolic Conformance Tests for Implementation Models (Position Paper)

48. Applying Real-Time Scheduling Techniques to Software Processes: A Position Paper

49. Active alice: using real paper to interact with electronic text

50. Cryptographic Assumptions: A Position Paper