Sciweavers

878 search results - page 125 / 176
» What's ahead in computer design
Sort
View
ERSA
2006
102views Hardware» more  ERSA 2006»
13 years 10 months ago
Process Isolation for Reconfigurable Hardware
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes running on the same device. While embedded operati...
Herwin Chan, Patrick Schaumont, Ingrid Verbauwhede
HUC
2010
Springer
13 years 10 months ago
Serendipitous family stories: using findings from a study on family communication to share family history
Storytelling and sharing family histories are important parts of what it means to "be" a family. Based on results from a study on intergenerational communication over a ...
Frank R. Bentley, Sujoy Kumar Chowduhry
HASKELL
2008
ACM
13 years 10 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
OOPSLA
2010
Springer
13 years 7 months ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz
HCI
2009
13 years 6 months ago
Trail Patterns in Social Tagging Systems: Role of Tags as Digital Pheromones
The popularity of social information systems has been driven by their ability to help users manage, organize and share online resources. Though the research exploring the use of ta...
Thomas George Kannampallil, Wai-Tat Fu