Results 241 to 250 of about 1,556,687 (280)
Some of the next articles are maybe not open access.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015
Nowadays, most mobile applications rely on device screen locking mechanisms for ensuring practical security, which expects the users to explicitly authenticate with a PIN or biometric irrespective of the perceived threats. Owing to this usability issues, many avoid using device locks potentially compromising the security. To overcome the limitations of
Arun Ramakrishnan +3 more
openaire +1 more source
Nowadays, most mobile applications rely on device screen locking mechanisms for ensuring practical security, which expects the users to explicitly authenticate with a PIN or biometric irrespective of the perceived threats. Owing to this usability issues, many avoid using device locks potentially compromising the security. To overcome the limitations of
Arun Ramakrishnan +3 more
openaire +1 more source
ACM SIGAda Ada Letters, 1997
This paper presents a process for the reengineering of computer-based control systems, and describes tools that automate portions of the process. The intermediate representation (IR) for capturing features of computer-based systems during reverse engineering is presented.
openaire +1 more source
This paper presents a process for the reengineering of computer-based control systems, and describes tools that automate portions of the process. The intermediate representation (IR) for capturing features of computer-based systems during reverse engineering is presented.
openaire +1 more source
Early Release Science of the exoplanet WASP-39b with JWST NIRSpec PRISM
Nature, 2023Zafar Rustamkulov +2 more
exaly
From prism–prism via grating–prism to grating–grating compounds
Applied Optics, 1980openaire +2 more sources
Prism-shaped hollow carbon decorated with polyaniline for microwave absorption
Chemical Engineering Journal, 2020Xiang Li, lujun Yu, Yubing Dong
exaly

