Sciweavers

316 search results - page 48 / 64
» Variations in Access Control Logic
Sort
View
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
14 years 1 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
DAC
2001
ACM
14 years 8 months ago
LOTTERYBUS: A New High-Performance Communication Architecture for System-on-Chip Designs
This paper presents LOTTERYBUS, a novel high-performance communication architecture for system-on-chip (SoC) designs. The LOTTERYBUS architecture was designed to address the follo...
Kanishka Lahiri, Anand Raghunathan, Ganesh Lakshmi...
ICSM
2009
IEEE
14 years 2 months ago
BCC: Enhancing code completion for better API usability
Nowadays, programmers spend much of their workday dealing with code libraries and frameworks that are bloated with APIs. One common way of interacting with APIs is through Code Co...
David M. Pletcher, Daqing Hou
FCCM
2007
IEEE
129views VLSI» more  FCCM 2007»
14 years 1 months ago
Automatic On-chip Memory Minimization for Data Reuse
FPGA-based computing engines have become a promising option for the implementation of computationally intensive applications due to high flexibility and parallelism. However, one...
Qiang Liu, George A. Constantinides, Konstantinos ...
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 1 months ago
Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks
Abstract— Wireless ad hoc networks provide a useful communications infrastructure for the mobile battlefield. In this paper we apply and develop passive radio frequency signal s...
Jon Arnold, Nigel Bean, Miro Kraetzl, Matthew Roug...