Sciweavers

352 search results - page 59 / 71
» Context-sensitive Access Control Model and Implementation
Sort
View
ECTEL
2006
Springer
14 years 9 days ago
Towards Community-Driven Development of Educational Materials: The Edukalibre Approach
Abstract. The libre software development model has shown how combining collective intelligence can lead to revolutionary methods that underpin major software advancements. This pap...
Jesús M. González-Barahona, Vania Di...
JTRES
2010
ACM
13 years 8 months ago
Exhaustive testing of safety critical Java
With traditional testing, the test case has no control over non-deterministic scheduling decisions, and thus errors dependent on scheduling are only found by pure chance. Java Pat...
Tomás Kalibera, Pavel Parizek, Michal Maloh...
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 8 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
TPDS
2008
115views more  TPDS 2008»
13 years 8 months ago
An Adaptive GTS Allocation Scheme for IEEE 802.15.4
IEEE 802.15.4 is a new standard uniquely designed for low-rate wireless personal area networks. It targets ultralow complexity, cost, and power for low-rate wireless connectivity a...
Yu-Kai Huang, Ai-Chun Pang, Hui-Nien Hung
VLDB
2002
ACM
122views Database» more  VLDB 2002»
13 years 8 months ago
Lightweight Flexible Isolation for Language-based Extensible Systems
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Laurent Daynès, Grzegorz Czajkowski