Sciweavers

35419 search results - page 245 / 7084
» How are we doing
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
15 years 2 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
139
Voted
AVI
2008
15 years 7 months ago
Users' quest for an optimized representation of a multi-device space
A plethora of reaching techniques, intended for moving objects between locations distant to the user, have recently been proposed and tested. One of the most promising techniques i...
Dzmitry Aliakseyeu, Andrés Lucero, Jean-Ber...
COMPSAC
2008
IEEE
15 years 11 months ago
How to Enhance UDDI with Dependability Capabilities
How dependability is to be assessed and ensured during Web Service operation and how unbiased and trusted mechanisms supporting this are to be developed are still open issues. Thi...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...
ETT
2002
175views Education» more  ETT 2002»
15 years 4 months ago
A multichannel acoustic echo canceler double-talk detector based on a normalized cross-correlation matrix
Multichannel acoustic echo cancellation is basically composed of two parts. One part is a multichannel system identification problem which is nontrivial to solve. The other part, w...
Jacob Benesty, Tomas Gänsler
DPPI
2007
ACM
15 years 8 months ago
From entry to access: how shareability comes about
Abstract. Shareability is a design principle that refers to how a system, interface, or device engages a group of collocated, co-present users in shared interactions around the sam...
Eva Hornecker, Paul Marshall, Yvonne Rogers