Sciweavers

1293 search results - page 135 / 259
» The infrastructure problem in HCI
Sort
View
ACSAC
2002
IEEE
14 years 1 months ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
DEXAW
2002
IEEE
118views Database» more  DEXAW 2002»
14 years 1 months ago
From Location Databases to Pervasive Catalog
One characteristic of the next generation wireless mobile environments is a high level of interoperability between mobile applications and services. This imposes significant dema...
Panos K. Chrysanthis, Vladimir Zadorozhny
ICDCSW
2002
IEEE
14 years 1 months ago
A Physically Grounded Approach to Coordinate Movements in a Team
This paper focuses on the problems of coordinating the movements of a cooperative team in an environment, and proposes an approach that takes inspiration from the laws of physics....
Letizia Leonardi, Marco Mamei, Franco Zambonelli
NOSSDAV
2001
Springer
14 years 20 days ago
Towards junking the PBX: deploying IP telephony
We describe the architecture and implementation of our Internet telephony test-bed intended to replace the departmental PBX (telephone switch). It interworks with the traditional ...
Wenyu Jiang, Jonathan Lennox, Henning Schulzrinne,...
IWSSD
2000
IEEE
14 years 18 days ago
Model Checking Implicit-Invocation Systems
While implicit invocation (publish-subscribe) systems have goodengineering properties, they are difficult toreason about and to test. Model checking such systems is an attractive...
David Garlan, Serge Khersonsky