Sciweavers

16430 search results - page 3067 / 3286
» On Computable Tree Functions
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
SIGGRAPH
2009
ACM
14 years 2 months ago
BiDi screen: a thin, depth-sensing LCD for 3D interaction using light fields
We transform an LCD into a display that supports both 2D multitouch and unencumbered 3D gestures. Our BiDirectional (BiDi) screen, capable of both image capture and display, is in...
Matthew Hirsch, Douglas Lanman, Henry Holtzman, Ra...
SAC
2010
ACM
14 years 2 months ago
General constant expressions for system programming languages
Most mainstream system programming languages provide support for builtin types, and extension mechanisms through userdefined types. They also come with a notion of constant expre...
Gabriel Dos Reis, Bjarne Stroustrup
AINA
2008
IEEE
14 years 2 months ago
Senceive: A Middleware for a Wireless Sensor Network
— A significant amount of research effort is being carried out by the research community to increase the scope and usefulness of wireless sensor networks; to optimise life time ...
Christian Hermann, Waltenegus Dargie
CSFW
2008
IEEE
14 years 2 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
« Prev « First page 3067 / 3286 Last » Next »