Search

Showing total 63,067 results

Search Constraints

Start Over You searched for: Topic computer.software_genre Remove constraint Topic: computer.software_genre Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
63,067 results

Search Results

1. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models

2. Hostile Blockchain Takeovers (Short Paper)

3. An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature

4. Item Differential in Computer Based and Paper Based Versions of a High Stakes Tertiary Entrance Test: Diagrams and the Problem of Annotation

5. A Short Paper on the Incentives to Share Private Information for Population Estimates

6. Survey of Pen-and-Paper Computing

7. Users Can Do Better with PDAs Than Paper: A Usability Study of PDA-Based vs. Paper-Based Nursing Documentation Systems

8. Evaluating Paper Prototype for Tabletop Collaborative Game Applications

9. An Intelligent Shopping List - Combining Digital Paper with Product Ontologies

10. Towards Secure Bioinformatics Services (Short Paper)

11. Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)

12. Tactile Paper Prototyping with Blind Subjects

13. An Evaluation Framework for Analytical Methods of Integrating Electronic Word-of-Mouth Information: Position Paper

14. A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)

15. Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)

16. The Research and Application of Fuzzy Entropy Weight Comprehensive Evaluation Method in Paper Quality Evaluation

17. Advanced Paper Document in a Projection Display

18. Paper on the Move

19. A Short Paper on Blind Signatures from Knowledge Assumptions

20. Private eCash in Practice (Short Paper)

21. A Position Paper on ’Living Laboratories’: Rethinking Ecological Designs and Experimentation in Human-Computer Interaction

22. Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)

23. An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)

24. A Robust and Secure RFID-Based Pedigree System (Short Paper)

25. Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)

26. Working Group I — Requirements and Applications — Position Paper: Requirements for 3D in Geographic Information Systems Applications

27. Distilling Scenarios from Patterns for Software Architecture Evaluation – A Position Paper

28. What is the Best Way to Allocate Teacher’s Efforts: How Accurately Should We Write on the Board? When Marking Comments on Student Papers?

29. DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)

30. KBID: Kerberos Bracelet Identification (Short Paper)

31. Executable and Symbolic Conformance Tests for Implementation Models (Position Paper)

32. Applying Real-Time Scheduling Techniques to Software Processes: A Position Paper

33. Cryptographic Assumptions: A Position Paper

34. Position paper: Security in TACOMA

35. Automatic hypertext conversion of paper document collections

36. Augmentation Strategies for Paper-Based Content Integrated with Digital Learning Supports Using Smartphones

37. The Topsy project: a position paper

38. CollPhoto: A Paper + Smartphone Problem Solving Environment for Science and Engineering Lectures

39. Effects of Paper on Page Turning: Comparison of Paper and Electronic Media in Reading Documents with Endnotes

40. Social Media on a Piece of Paper: A Study of Hybrid and Sustainable Media Using Active Infrared Vision

41. App-Free Zone: Paper Maps as Alternative to Electronic Indoor Navigation Aids and Their Empirical Evaluation with Large User Bases

42. Massive Scientific Paper Mining: Modeling, Design and Implementation

43. Classifying Papers from Different Computer Science Conferences

44. Text Classification of Technical Papers Based on Text Segmentation

45. Paper Retrieval Based on Specific Paper Features: Chain and Laid Lines

46. Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)

47. Composable Transactional Objects: A Position Paper

48. A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates

49. Multi-objective Test Paper Evaluation in the Process of Composing with Computer

50. Personalized Paper Recommendation Based on User Historical Behavior