Sciweavers

4731 search results - page 177 / 947
» Securing Interactive Programs
Sort
View
IJSN
2007
120views more  IJSN 2007»
13 years 10 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
EUROSYS
2008
ACM
14 years 7 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
SIGCSE
2009
ACM
124views Education» more  SIGCSE 2009»
14 years 10 months ago
Music performamatics: interdisciplinary interaction
This paper describes how a graphical user interface (GUI) programming course offered by the Dept. of Computer Science (CS) was paired with a general teaching methods course offere...
Jesse M. Heines, Gena R. Greher, Sarah Kuhn
STOC
2001
ACM
129views Algorithms» more  STOC 2001»
14 years 10 months ago
Interaction in quantum communication and the complexity of set disjointness
One of the most intriguing facts about communication using quantum states is that these states cannot be used to transmit more classical bits than the number of qubits used, yet i...
Hartmut Klauck, Ashwin Nayak, Amnon Ta-Shma, David...
AAAI
2006
13 years 11 months ago
Distributed Interactive Learning in Multi-Agent Systems
Both explanation-based and inductive learning techniques have proven successful in a variety of distributed domains. However, learning in multi-agent systems does not necessarily ...
Jian Huang, Adrian R. Pearce