Sciweavers

1361 search results - page 129 / 273
» From Legacy to Web through Interaction Modeling
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 8 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
WSC
2004
15 years 5 months ago
Parallel Simulation of UAV Swarm Scenarios
The concept of operations for a micro-UAV system is adopted from nature from the appearance of flocking birds, movement of a school of fish, and swarming bees among others. This &...
Joshua J. Corner, Gary B. Lamont
EG
2007
86views more  EG 2007»
15 years 4 months ago
Towards secure online elections: models, primitives and open issues
: Electronic voting may be a feasible option for several election environments, from closed-group elections to nation-wide elections. Especially with online voting, people will be ...
Emmanouil Magkos, Panayiotis Kotzanikolaou, Christ...
TKDE
2010
135views more  TKDE 2010»
15 years 2 months ago
A Rule-Based Trust Negotiation System
—Open distributed environments such as the World Wide Web facilitate information sharing but provide limited support to the protection of sensitive information and resources. Tru...
Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedil...
UIST
2006
ACM
15 years 10 months ago
RecipeSheet: creating, combining and controlling information processors
Many tasks require users to extract information from diverse sources, to edit or process this information locally, and to explore how the end results are affected by changes in th...
Aran Lunzer, Kasper Hornbæk