Sciweavers

468 search results - page 39 / 94
» Interactivity for Reactive Access Control
Sort
View
GRID
2006
Springer
13 years 7 months ago
Providing Portlet-Based Client Access to CIMA-Enabled Crystallographic Instruments, Sensors, and Data
The Common Instrument Middleware Architecture (CIMA) project, supported by the NSF Middleware Initiative, aims at making scientific instruments and sensors remotely accessible by ...
Hao Yin, Donald F. McMullen, Mehmet A. Nacar, Marl...
POPL
1990
ACM
13 years 11 months ago
Concurrent Constraint Programming
Abstract. Concurrent constraint programming is a simple but powerful framework for computation based on four basic computational ideas: concurrency (multiple agents are simultaneou...
Vijay A. Saraswat, Martin C. Rinard
CAISE
2008
Springer
13 years 9 months ago
Exploiting the Annotation Practice for Personal and Collective Information Management
Abstract. Information nowadays is a capital for any organization intending to be reactive and aware of its environment. Unfortunately most modern organizations overdose on informat...
Guillaume Cabanac, Max Chevalier, Claude Chrisment...
TVCG
2011
144views more  TVCG 2011»
13 years 2 months ago
An Immersive Virtual Peer for Studying Social Influences on Child Cyclists' Road-Crossing Behavior
—The goal of our work is to develop a programmatically controlled peer to bicycle with a human subject for the purpose of studying how social interactions influence road-crossing...
Sabarish Babu, Timofey Grechkin, Benjamin Chihak, ...
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...