Sciweavers

1477 search results - page 221 / 296
» Token flow control
Sort
View
CSFW
2008
IEEE
13 years 11 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
BCSHCI
2008
13 years 11 months ago
Distributed cognition and mobile healthcare work
In this paper, we look at the application of the DiCoT methodology [4] to the analysis of a mobile healthcare setting. While the methodology includes a set of principles and theme...
Joseph McKnight, Gavin Doherty
WCET
2008
13 years 11 months ago
INFER: Interactive Timing Profiles based on Bayesian Networks
We propose an approach for timing analysis of software-based embedded computer systems that builds on the established probabilistic framework of Bayesian networks. We envision an ...
Michael Zolda
ICWN
2003
13 years 11 months ago
The Effect of Disengaging RTS/CTS Dialogue in IEEE 802.11 MAC Protocol
In this paper, we study the effect of using or disengaging the RTS/CTS dialogue in IEEE 802.11 DCF MAC protocol incorporating the realistic condition under which carrier sensing, ...
Laura Huei-jiun Ju, Izhak Rubin
VMV
2004
157views Visualization» more  VMV 2004»
13 years 11 months ago
Interactive Hierarchical Space Carving with Projector-based Calibrations
We present an interactive reconstruction system based on space carving. The user controls the camera and object positions and their impact on the reconstruction is immediately dis...
Martin Granger-Piché, Emric Epstein, Pierre...