Sciweavers

4731 search results - page 148 / 947
» Securing Interactive Programs
Sort
View
ICMLC
2010
Springer
13 years 7 months ago
An ontology-supported ubiquitous interface agent for cloud computing - Example on Bluetooth wireless technique with Java program
: This paper focused on designing of a ubiquitous interface agent based on the ontology technology and interaction diagram with the backend information agent system, i.e., OntoIAS,...
Sheng-Yuan Yang, Chun-Liang Hsu, Dong-Liang Lee
RAS
2010
117views more  RAS 2010»
13 years 7 months ago
Direct programming of a central pattern generator for periodic motions by touching
Much of the literature shows that Central Pattern Generators (CPGs) are a good approach for generating periodic motions for legged robots. In most of the presented works the numer...
Fabio Dalla Libera, Takashi Minato, Hiroshi Ishigu...
CASES
2010
ACM
13 years 7 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
ACSAC
2006
IEEE
14 years 3 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
SOUPS
2005
ACM
14 years 2 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...