Sciweavers

1358 search results - page 213 / 272
» Mapping Accessibility Over Time
Sort
View
ESORICS
2000
Springer
14 years 10 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
IPPS
1997
IEEE
14 years 8 days ago
View Caching: Efficient Software Shared Memory for Dynamic Computations
Software distributed shared memory (DSM) techniques, while effective on applications with coarse-grained sharing, yield poor performance for the fine-grained sharing encountered i...
Vijay Karamcheti, Andrew A. Chien
VISSYM
2007
13 years 11 months ago
TrustNeighborhoods: Visualizing Trust in Distributed File Sharing Systems
We present TrustNeighborhoods, a security trust visualization for situational awareness on the Internet aimed at novice and intermediate users of a distributed file sharing system...
Niklas Elmqvist, Philippas Tsigas
CHI
2005
ACM
13 years 10 months ago
Experience buffers: a socially appropriate, selective archiving tool for evidence-based care
Diagnosis, treatment, and monitoring of interventions for children with autism can profit most when caregivers have substantial amounts of data they can easily record and review a...
Gillian R. Hayes, Khai N. Truong, Gregory D. Abowd...
LREC
2008
120views Education» more  LREC 2008»
13 years 10 months ago
The U.S. Policy Agenda Legislation Corpus Volume 1 - a Language Resource from 1947 - 1998
We introduce the corpus of United States Congressional bills from 1947 to 1998 for use by language research communities. The U.S. Policy Agenda Legislation Corpus Volume 1 (USPALC...
Stephen Purpura, John Wilkerson, Dustin Hillard