Sciweavers

2337 search results - page 348 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
VRST
2005
ACM
14 years 2 months ago
A practical system for laser pointer interaction on large displays
Much work has been done on the development of laser pointers as interaction devices. Typically a camera captures images of a display surface and extracts a laser pointer dot locat...
Benjamin A. Ahlborn, David Thompson, Oliver Kreylo...
SAC
2000
ACM
14 years 1 months ago
The Evolution of the DARWIN System
DARWIN is a web-based system for presenting the results of wind-tunnel testing and computational model analyses to aerospace designers. DARWIN captures the data, maintains the inf...
Joan D. Walton, Robert E. Filman, David J. Korsmey...
INFOCOM
2002
IEEE
14 years 2 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
DAC
2008
ACM
14 years 10 months ago
Latency and bandwidth efficient communication through system customization for embedded multiprocessors
We present a cross-layer customization methodology for latency and bandwidth efficient inter-core communication in embedded multiprocessors. The methodology integrates compiler, o...
Chenjie Yu, Peter Petrov
DEEC
2006
IEEE
14 years 3 months ago
BestChoice: A Decision Support System for Supplier Selection in e-Marketplaces
A growing number of companies are outsourcing their purchasing processes to independent purchasing agencies. These agencies now have to process an ever increasing number of purchas...
Dongjoo Lee, Taehee Lee, Suekyung Lee, Ok-Ran Jeon...