Sciweavers

4386 search results - page 808 / 878
» A Tamper-Resistant Programming Language System
Sort
View
IUI
2006
ACM
14 years 4 months ago
Augmenting kitchen appliances with a shared context using knowledge about daily events
Networked appliances can simplify our lives, but interacting with them can be difficult in itself. KitchenSense is an early prototype of a networked kitchen full of sensors that u...
Chia-Hsun Jackie Lee, Leonardo Bonanni, José...
ASAP
2005
IEEE
133views Hardware» more  ASAP 2005»
14 years 3 months ago
Speedups from Partitioning Critical Software Parts to Coarse-Grain Reconfigurable Hardware
In this paper, we propose a hardware/software partitioning method for improving applications’ performance in embedded systems. Critical software parts are accelerated on hardwar...
Michalis D. Galanis, Grigoris Dimitroulakos, Costa...
APLAS
2005
ACM
14 years 3 months ago
Heterogeneous Fixed Points with Application to Points-To Analysis
Many situations can be modeled as solutions of systems of simultaneous equations. If the functions of these equations monotonically increase in all bound variables, then the existe...
Aditya Kanade, Uday P. Khedker, Amitabha Sanyal
UIST
2005
ACM
14 years 3 months ago
Artistic resizing: a technique for rich scale-sensitive vector graphics
When involved in the visual design of graphical user interfaces, graphic designers can do more than providing static graphics for programmers to incorporate into applications. We ...
Pierre Dragicevic, Stéphane Chatty, David T...
IFIP
2005
Springer
14 years 3 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan