Sciweavers

232 search results - page 35 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
PERVASIVE
2006
Springer
13 years 9 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama
CHI
2011
ACM
13 years 1 months ago
The reading desk: applying physical interactions to digital documents
Reading is increasingly being performed interactively on-screen; for instance, new novels are now routinely released in electronic format for viewing on PCs and mobile devices. Un...
Jennifer Pearson, George Buchanan, Harold W. Thimb...
ESOP
2003
Springer
14 years 3 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
EUROSYS
2008
ACM
14 years 7 months ago
Samurai: protecting critical data in unsafe languages
Programs written in type-unsafe languages such as C and C++ incur costly memory errors that result in corrupted data structures, program crashes, and incorrect results. We present...
Karthik Pattabiraman, Vinod Grover, Benjamin G. Zo...
IPM
2007
129views more  IPM 2007»
13 years 9 months ago
Examining the effectiveness of real-time query expansion
Interactive query expansion (IQE) (c.f. Efthimiadis, 1996) is a potentially useful technique to help searchers formulate improved query statements, and ultimately retrieve better ...
Ryen W. White, Gary Marchionini