Sciweavers

6137 search results - page 96 / 1228
» Securing Collaborative Applications
Sort
View
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
13 years 10 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung
CHI
2008
ACM
14 years 9 months ago
Collaborative interaction with volumetric displays
Volumetric displays possess a number of unique properties which potentially make them particularly suitable for collaborative 3D applications. Because such displays have only rece...
Tovi Grossman, Ravin Balakrishnan
MTA
2007
70views more  MTA 2007»
13 years 8 months ago
Tools for transparent synchronous collaborative environments
Synchronous collaborative environments can provide an identical visual and operable working area among geographically separated participants. There are two basic approaches for pro...
Abdulmotaleb El-Saddik, Dongsheng Yang, Nicolas D....
ZUM
2000
Springer
14 years 14 days ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper
SP
1990
IEEE
14 years 29 days ago
A VMM Security Kernel for the VAX Architecture
This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX architecture. The paper particularly focuses on how the system's hardware,...
Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin...