Sciweavers

409 search results - page 74 / 82
» Flexible Scheduler-Independent Security
Sort
View
CHI
2008
ACM
13 years 8 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
C++
1994
128views more  C++ 1994»
13 years 8 months ago
Implementing Signatures for C++
ne the design and detail the implementation of a language extension for abstracting types and for decoupling subtyping and inheritance in C++. This extension gives the user more of...
Gerald Baumgartner, Vincent F. Russo
CLEIEJ
2006
147views more  CLEIEJ 2006»
13 years 7 months ago
JADIMA: Virtual Machine Architecture for building JAVA Applications on Grid Platforms
This paper describes JADIMA (Java Distributed Machine), a collaborative platform to construct high performance distributed JAVA applications. JADIMA is a system that automatically...
Yudith Cardinale, Eduardo Blanco, Jesús De ...
COMCOM
2006
154views more  COMCOM 2006»
13 years 7 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 7 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem