Sciweavers

2504 search results - page 468 / 501
» Using Probabilistic Information in Data Integration
Sort
View
TCS
2008
13 years 7 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
PRESENCE
2007
167views more  PRESENCE 2007»
13 years 7 months ago
TimbreFields: 3D Interactive Sound Models for Real-Time Audio
We describe a methodology for Virtual Reality designers to capture and resynthesize the variations in sound made by objects when we interact with them through contact such as touc...
Richard Corbett, Kees van den Doel, John E. Lloyd,...
PUC
2007
164views more  PUC 2007»
13 years 7 months ago
Designing home availability services
Abstract We have explored the challenges of designing domestic services to help family and friends determine mutually agreeable times to call. In our first study, we identified a...
Kristine S. Nagel, Ja-Young Sung, Gregory D. Abowd
IV
2010
IEEE
150views Visualization» more  IV 2010»
13 years 6 months ago
Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design
Despite the growing number of systems providing visual analytic support for investigative analysis, few empirical studies include investigations on the analytical reasoning proces...
Maria Riveiro, Göran Falkman
WISEC
2010
ACM
13 years 5 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu