Sciweavers

1010 search results - page 173 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
PUC
2000
97views more  PUC 2000»
13 years 7 months ago
Look, Ma, My Homepage is Mobile!
Much of the ongoing research in ubiquitous computing has concentrated on providing context information, e.g. location information, to the level of services and applications. Typic...
Roger Kehr, Andreas Zeidler
SIGGRAPH
1997
ACM
14 years 16 hour ago
Moving objects in space: exploiting proprioception in virtual-environment interaction
Manipulation in immersive virtual environments is difficult partly because users must do without the haptic contact with real objects they rely on in the real world to orient them...
Mark R. Mine, Frederick P. Brooks Jr., Carlo H. S&...
CODASPY
2012
12 years 3 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
EUROMICRO
1997
IEEE
14 years 1 days ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
GECCO
2009
Springer
193views Optimization» more  GECCO 2009»
14 years 13 days ago
Optimization of dynamic memory managers for embedded systems using grammatical evolution
New portable consumer embedded devices must execute multimedia applications (e.g., 3D games, video players and signal processing software, etc.) that demand extensive memory acces...
José L. Risco-Martín, David Atienza,...