Sciweavers

1082 search results - page 197 / 217
» Policy support for call control
Sort
View
HCI
2009
13 years 6 months ago
Enabling Interactive Access to Web Tables
Tables are widely used in web pages. Unfortunately, most web tables can only be passively accessed but cannot be interactively accessed, that is, users can view information display...
Xin Yang, Wenchang Xu, Yuanchun Shi
ICINCO
2009
132views Robotics» more  ICINCO 2009»
13 years 6 months ago
Discrete Event Diagnosis using Petri Nets
This paper serves as a support for the plenary address given by the second author during the conference. In this paper we present an approach to on-line diagnosis of discrete even...
Maria Paola Cabasino, Alessandro Giua, Carla Seatz...
CORR
2011
Springer
145views Education» more  CORR 2011»
13 years 3 months ago
SLDs for Visualizing Multicolor Elevation Contour Lines in Geo-Spatial Web Applications
— This paper addresses the need for geospatial consumers (either humans or machines) to visualize multicolored elevation contour poly lines with respect their different contour i...
B. G. Kodge, P. S. Hiremath
CSFW
2011
IEEE
12 years 8 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 3 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...