In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
High performance monitoring and control of real-time environments over the Internet is of importance to many users. The general public, as well as professionals, desires the abili...
Christiane Iaccarino, Meridith A. Sigel, Ralph E. ...
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
Multi-user, touch-sensing input devices create opportunities for the use of cooperative gestures ? multi-user gestural interactions for single display groupware. Cooperative gestu...
Meredith Ringel Morris, Anqi Huang, Andreas Paepck...
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time dom...