Sciweavers

2250 search results - page 357 / 450
» Authorizing applications in singularity
Sort
View
ISCAS
2005
IEEE
171views Hardware» more  ISCAS 2005»
15 years 10 months ago
Image transmission over IEEE 802.15.4 and ZigBee networks
An image sensor network platform is developed for testing transmission of images over ZigBee networks that support multi-hopping. The ZigBee is a low rate and low power networking...
G. Pekhteryev, Zafer Sahinoglu, Philip V. Orlik, G...
NDSS
2005
IEEE
15 years 10 months ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...
SMI
2005
IEEE
15 years 10 months ago
Designing with Distance Fields
Distance fields provide an implicit representation of shape that has advantages in many application areas; in this overview, we focus on their use in digital design. Distance fi...
Sarah F. Frisken, Ronald N. Perry
DMSN
2004
ACM
15 years 10 months ago
Region streams: functional macroprogramming for sensor networks
Sensor networks present a number of novel programming challenges for application developers. Their inherent limitations of computational power, communication bandwidth, and energy...
Ryan Newton, Matt Welsh
JCDL
2004
ACM
175views Education» more  JCDL 2004»
15 years 10 months ago
Supporting personal collections across digital libraries in spatial hypertext
Creating, maintaining, or using a digital library requires the manipulation of digital documents. Information workspaces provide a visual representation allowing users to collect,...
Frank M. Shipman III, Hao-wei Hsieh, J. Michael Mo...