Sciweavers

406 search results - page 77 / 82
» Viewpoint Centric Design
Sort
View
POPL
2008
ACM
14 years 7 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
ICFP
2006
ACM
14 years 7 months ago
Modelling deterministic concurrent I/O
The problem of expressing I/O and side effects in functional languages is a well-established one. This paper addresses this problem from a general semantic viewpoint by giving a u...
Malcolm Dowse, Andrew Butterfield
HRI
2010
ACM
14 years 2 months ago
Psychological intimacy with robots?: using interaction patterns to uncover depth of relation
— This conceptual paper broaches possibilities and limits of establishing psychological intimacy in HRI. Keywords- human-robot interaction, interaction patterns, social and moral...
Peter H. Kahn Jr., Jolina H. Ruckert, Takayuki Kan...
SAC
2009
ACM
14 years 2 months ago
Impact of NVRAM write cache for file system metadata on I/O performance in embedded systems
File systems make use of part of DRAM as the buffer cache to enhance its performance in traditional systems. In this paper, we consider the use of Non-Volatile RAM (NVRAM) as a w...
In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim...
INFOCOM
2008
IEEE
14 years 1 months ago
Dynamic Bandwidth Request-Allocation Algorithm for Real-Time Services in IEEE 802.16 Broadband Wireless Access Networks
—The emerging broadband wireless access (BWA) technology based on IEEE 802.16 is one of the most promising solutions to provide ubiquitous wireless access to the broadband servic...
Eun-Chan Park, Hwangnam Kim, Jae-Young Kim, Han Se...