Sciweavers

34181 search results - page 132 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
IEEEARES
2007
IEEE
14 years 4 months ago
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
The formidable difficulty in securing systems stems in large part from the increasing complexity of the systems we build but also the degree to which we now depend on information ...
David Arsenault, Arun Sood, Yih Huang
UIST
1999
ACM
14 years 2 months ago
Implementing Phicons: Combining Computer Vision with InfraRed Technology for Interactive Physical Icons
This paper describes a novel physical icon [3] or “phicon-” based system that can be programmed to issue a range of commands about what the user wishes to do with handdrawn wh...
Darnell J. Moore, Roy Want, Beverly L. Harrison, A...
PUC
2008
141views more  PUC 2008»
13 years 9 months ago
A calendar based Internet content pre-caching agent for small computing devices
We described in earlier publications the principles of a system where internet content would be pre-cached, based on contextual information obtained from a user's electronic ...
Andreas Komninos, Mark D. Dunlop
SEUS
2010
IEEE
13 years 8 months ago
Time-Predictable Computing
Real-time systems need to be time-predictable in order to prove the timeliness of all their time-critical responses. While this is a well-known fact, recent efforts of the communit...
Raimund Kirner, Peter P. Puschner