Sciweavers

591 search results - page 94 / 119
» Securing the Broker Pattern
Sort
View
EUROSSC
2007
Springer
14 years 2 months ago
CenceMe - Injecting Sensing Presence into Social Networking Applications
Abstract. We present the design, prototype implementation, and evaluation of CenceMe, a personal sensing system that enables members of social networks to share their sensing prese...
Emiliano Miluzzo, Nicholas D. Lane, Shane B. Eisen...
ICOST
2007
Springer
14 years 2 months ago
Tracking People in Indoor Environments
Tracking the movement of people in indoor environments is useful for a variety of applications including elderly care, study of shopper behavior in shopping centers, security etc. ...
Candy Yiu, Suresh Singh
OOPSLA
2007
Springer
14 years 2 months ago
Compile-time execution structure of object-oriented programs with practical ownership domain annotations
Ownership domain annotations express and enforce design intent related to object encapsulation and communication directly in real object-oriented code. First, this work will make ...
Marwan Abi-Antoun
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
14 years 2 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
CAMP
2005
IEEE
14 years 2 months ago
Virtual Astronomy, Information Technology, and the New Scientific Methodology
—All sciences, including astronomy, are now entering the era of information abundance. The exponentially increasing volume and complexity of modern data sets promises to transfor...
S. George Djorgovski