Sciweavers

8623 search results - page 1622 / 1725
» Software engineering for secure systems
Sort
View
UIST
2004
ACM
14 years 2 months ago
Interacting with hidden content using content-aware free-space transparency
We present content-aware free-space transparency, an approach to viewing and manipulating the otherwise hidden content of obscured windows through unimportant regions of overlappi...
Edward W. Ishak, Steven Feiner
UIST
2004
ACM
14 years 2 months ago
Visual tracking of bare fingers for interactive surfaces
Visual tracking of bare fingers allows more direct manipulation of digital objects, multiple simultaneous users interacting with their two hands, and permits the interaction on l...
Julien Letessier, François Bérard
UIST
2004
ACM
14 years 2 months ago
Who cares?: reflecting who is reading what on distributed community bulletin boards
In this paper, we describe the YeTi information sharing system that has been designed to foster community building through informal digital content sharing. The YeTi system is a g...
Toshiya Yamada, Jun Shingu, Elizabeth F. Churchill...
ARCS
2004
Springer
14 years 2 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
ICFEM
2004
Springer
14 years 2 months ago
Linear Inequality LTL (iLTL): A Model Checker for Discrete Time Markov Chains
Abstract. We develop a way of analyzing the behavior of systems modeled using Discrete Time Markov Chains (DTMC). Specifically, we define iLTL, an LTL with linear inequalities on...
YoungMin Kwon, Gul Agha
« Prev « First page 1622 / 1725 Last » Next »