Sciweavers

141 search results - page 27 / 29
» Enhancing Security and Privacy in Traffic-Monitoring Systems
Sort
View
OOPSLA
2009
Springer
14 years 1 months ago
Reimagining literate programming
In this paper we describe Ginger, a new language with first class support for literate programming. Literate programming refers to a philosophy that argues computer programs shou...
James Dean Palmer, Eddie Hillenbrand
SACMAT
2009
ACM
14 years 1 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
AGENTS
2001
Springer
13 years 12 months ago
An assistive robotic agent for pedestrian mobility
The goal of this project is to develop a pedestrian mobility aid for the elderly. In order for this type of assistive technology to be useful and accepted by its intended user com...
Glenn S. Wasson, James P. Gunderson, Sean Graves, ...
OOPSLA
2010
Springer
13 years 5 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
ACSAC
2010
IEEE
13 years 5 months ago
Exploiting smart-phone USB connectivity for fun and profit
The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google's Android and Apple&#...
Zhaohui Wang, Angelos Stavrou