Sciweavers

23406 search results - page 4523 / 4682
» Architecture, Design, Implementation
Sort
View
CCS
2009
ACM
16 years 5 months ago
PBES: a policy based encryption system with application to data sharing in the power grid
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is el...
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki,...
CCS
2009
ACM
16 years 5 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
CHI
2009
ACM
16 years 5 months ago
Body-based interaction for desktop games
Interaction for desktop games is mostly limited to keyboard and mouse input. We are investigating the benefits of adding body-based interaction to complement keyboard and mouse in...
Mara G. Silva, Doug A. Bowman
SIGCSE
2009
ACM
194views Education» more  SIGCSE 2009»
16 years 5 months ago
Integrating pedagogical code reviews into a CS 1 course: an empirical study
Formal code inspections are employed by teams of professional software engineers to identify software defects and improve the quality of software. After reviewing a piece of code ...
Christopher D. Hundhausen, Anukrati Agrawal, Dana ...
PPOPP
2009
ACM
16 years 5 months ago
A comprehensive strategy for contention management in software transactional memory
In Software Transactional Memory (STM), contention management refers to the mechanisms used to ensure forward progress-to avoid livelock and starvation, and to promote throughput ...
Michael F. Spear, Luke Dalessandro, Virendra J. Ma...
« Prev « First page 4523 / 4682 Last » Next »