Search

Showing total 63,067 results

Search Constraints

Start Over You searched for: Topic computer.software_genre Remove constraint Topic: computer.software_genre Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
63,067 results

Search Results

1. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models

2. Hostile Blockchain Takeovers (Short Paper)

3. An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature

4. A Short Paper on the Incentives to Share Private Information for Population Estimates

5. Item Differential in Computer Based and Paper Based Versions of a High Stakes Tertiary Entrance Test: Diagrams and the Problem of Annotation

6. Survey of Pen-and-Paper Computing

7. Evaluating Paper Prototype for Tabletop Collaborative Game Applications

8. Users Can Do Better with PDAs Than Paper: A Usability Study of PDA-Based vs. Paper-Based Nursing Documentation Systems

9. An Intelligent Shopping List - Combining Digital Paper with Product Ontologies

10. Towards Secure Bioinformatics Services (Short Paper)

11. Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)

12. What is the Best Way to Allocate Teacher’s Efforts: How Accurately Should We Write on the Board? When Marking Comments on Student Papers?

13. Tactile Paper Prototyping with Blind Subjects

14. An Evaluation Framework for Analytical Methods of Integrating Electronic Word-of-Mouth Information: Position Paper

15. A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)

16. Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)

17. A Short Paper on Blind Signatures from Knowledge Assumptions

18. Private eCash in Practice (Short Paper)

19. The Research and Application of Fuzzy Entropy Weight Comprehensive Evaluation Method in Paper Quality Evaluation

20. A Position Paper on ’Living Laboratories’: Rethinking Ecological Designs and Experimentation in Human-Computer Interaction

21. Advanced Paper Document in a Projection Display

22. Paper on the Move

23. Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)

24. An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)

25. A Robust and Secure RFID-Based Pedigree System (Short Paper)

26. Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)

27. DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)

28. KBID: Kerberos Bracelet Identification (Short Paper)

29. Working Group I — Requirements and Applications — Position Paper: Requirements for 3D in Geographic Information Systems Applications

30. Distilling Scenarios from Patterns for Software Architecture Evaluation – A Position Paper

31. Executable and Symbolic Conformance Tests for Implementation Models (Position Paper)

32. Cryptographic Assumptions: A Position Paper

33. Applying Real-Time Scheduling Techniques to Software Processes: A Position Paper

34. Augmentation Strategies for Paper-Based Content Integrated with Digital Learning Supports Using Smartphones

35. CollPhoto: A Paper + Smartphone Problem Solving Environment for Science and Engineering Lectures

36. Position paper: Security in TACOMA

37. Social Media on a Piece of Paper: A Study of Hybrid and Sustainable Media Using Active Infrared Vision

38. Effects of Paper on Page Turning: Comparison of Paper and Electronic Media in Reading Documents with Endnotes

39. Automatic hypertext conversion of paper document collections

40. App-Free Zone: Paper Maps as Alternative to Electronic Indoor Navigation Aids and Their Empirical Evaluation with Large User Bases

41. Massive Scientific Paper Mining: Modeling, Design and Implementation

42. Classifying Papers from Different Computer Science Conferences

43. Text Classification of Technical Papers Based on Text Segmentation

44. The Topsy project: a position paper

45. Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)

46. Composable Transactional Objects: A Position Paper

47. A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates

48. Multi-objective Test Paper Evaluation in the Process of Composing with Computer

49. Personalized Paper Recommendation Based on User Historical Behavior

50. Recognition and Pseudonymization of Personal Data in Paper-Based Health Records