Sciweavers

2135 search results - page 396 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
HASKELL
2008
ACM
13 years 11 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
GRID
2006
Springer
13 years 10 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
CORR
2007
Springer
52views Education» more  CORR 2007»
13 years 10 months ago
Hierarchical Unambiguity
Abstract. We develop techniques to investigate relativized hierarchical unambiguous computation. We apply our techniques to push forward some known constructs involving relativized...
Holger Spakowski, Rahul Tripathi
JCM
2008
70views more  JCM 2008»
13 years 9 months ago
Reed-Solomon Codes for Low Power Communications
Power consumption is a critical issue for many applications running on autonomous battery operated devices. In the context of low power communications, the use of Forward Error Cor...
Lionel Biard, Dominique Noguet
TMC
2008
164views more  TMC 2008»
13 years 9 months ago
Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks
Integrating mobile computing and localized user interaction into the Internet requires more than simply overcoming pure routing challenges. Apart from issues such as intermittent c...
Anargyros Garyfalos, Kevin C. Almeroth