Sciweavers

739 search results - page 37 / 148
» Information Flow in Credential Systems
Sort
View
ESORICS
2010
Springer
13 years 7 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
CSCW
2012
ACM
12 years 3 months ago
CrowdWeaver: visually managing complex crowd work
Though toolkits exist to create complex crowdsourced workflows, there is limited support for management of those workflows. Managing crowd workers and tasks requires significant i...
Aniket Kittur, Susheel Khamkar, Paul André,...
IOT
2010
13 years 5 months ago
Supporting interaction with the Internet of Things across objects, time and space
Effectively assisting people in complex and highly dynamic work environment requires advances in high-level declarative activity models that can describe the flow of human work act...
Fahim Kawsar, Gerd Kortuem, Bashar Altakrouri
WORDS
2005
IEEE
14 years 1 months ago
Towards a Flow Analysis for Embedded System C Programs
Reliable program Worst-Case Execution Time (WCET) estimates are a key component when designing and verifying real-time systems. One way to derive such estimates is by static WCET ...
Jan Gustafsson, Andreas Ermedahl, Björn Lispe...
CBMS
2008
IEEE
14 years 2 months ago
Support for Informal Information Use and its Formalization in Medical Work
This paper reports the findings from two field studies that reveal paper-based artifacts being heavily relied upon in medical shift work despite the deployment of a mobile technol...
Charlotte Tang, M. Sheelagh T. Carpendale