Sciweavers

166 search results - page 29 / 34
» Network Programming for the Rest of Us
Sort
View
IIWAS
2008
13 years 10 months ago
A model-prover for constrained dynamic conversations
In a service-oriented architecture, systems communicate by exchanging messages. In this work, we propose a formal model based on OCL-constrained UML Class diagrams and a methodolo...
Diletta Cacciagrano, Flavio Corradini, Rosario Cul...
AR
2007
99views more  AR 2007»
13 years 8 months ago
Experience-based imitation using RNNPB
Abstract— Robot imitation is a useful and promising alternative to robot programming. Robot imitation involves two crucial issues. The first is how a robot can imitate a human w...
Ryunosuke Yokoya, Tetsuya Ogata, Jun Tani, Kazunor...
CHI
2011
ACM
13 years 5 days ago
Effect of MobileASL on communication among deaf users
MobileASL, a software program enabling sign-language video on mobile devices over conventional U.S. cellular networks, was evaluated in a three-week field study during the summer ...
Joy Kim, Jessica J. Tran, Tressa W. Johnson, Richa...
TISSEC
2010
119views more  TISSEC 2010»
13 years 3 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
HOTOS
1997
IEEE
14 years 24 days ago
The Flux OS Toolkit: Reusable Components for OS Implementation
To an unappreciated degree, research both in operating systems andtheirprogramminglanguageshasbeen severely hampered by the lack of cleanly reusable code providing mundanelow-leve...
Bryan Ford, Kevin Van Maren, Jay Lepreau, Stephen ...