Sciweavers

2030 search results - page 292 / 406
» The Need for Customizable Operating Systems
Sort
View
JDCTA
2008
206views more  JDCTA 2008»
13 years 9 months ago
An Application Strategy for PLM in Construction Industry
There are many interests and researches among an industry as IT develops. It is important to use information effectively and adequately as applying IT to industry because IT provi...
Kyung-Min Min, Nam-Hyuk Ham, Ju-Hyung Kim, Yoon-Su...
PERVASIVE
2008
Springer
13 years 9 months ago
Providing an Integrated User Experience of Networked Media, Devices, and Services through End-User Composition
Networked devices for the storage and rendering of digital media are rapidly becoming ubiquitous in homes throughout the industrialized world. Existing approaches to home media con...
Mark W. Newman, Ame Elliott, Trevor F. Smith
COMCOM
2000
125views more  COMCOM 2000»
13 years 9 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
MVA
2000
152views Computer Vision» more  MVA 2000»
13 years 8 months ago
Automatic IC orientation checks
With the proliferation of different types of IC packages, there is a need for machine-vision-based inspection systems to be able to efficiently identify the orientation of IC packa...
Ashraf A. Kassim, H. Zhou, S. Ranganath
JCS
2002
118views more  JCS 2002»
13 years 8 months ago
Verified Formal Security Models for Multiapplicative Smart Cards
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure co...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...