Sciweavers

27 search results - page 4 / 6
» An Accidental Simula User
Sort
View
DSN
2007
IEEE
14 years 2 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
AVI
2004
13 years 9 months ago
Usability studies on a visualisation for parallel display and control of alternative scenarios
Many applications require comparison between alternative scenarios; most support it poorly. A subjunctive interface supports comparison through its facilities for parallel setup, ...
Aran Lunzer, Kasper Hornbæk
IWSEC
2009
Springer
14 years 2 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
SIGCOMM
2009
ACM
14 years 2 months ago
Apprehending joule thieves with cinder
Energy is the critical limiting resource to mobile computing devices. Correspondingly, an operating system must track, provision, and ration how applications consume energy. The e...
Stephen M. Rumble, Ryan Stutsman, Philip Levis, Da...
SIGECOM
2005
ACM
118views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular t...
Nicolas Christin, Andreas S. Weigend, John Chuang