Sciweavers

1818 search results - page 364 / 364
» How users use access control
Sort
View
SECRYPT
2010
129views Business» more  SECRYPT 2010»
13 years 2 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
WINET
2011
12 years 11 months ago
Sleep scheduling with expected common coverage in wireless sensor networks
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor...
Eyuphan Bulut, Ibrahim Korpeoglu
ICFP
1999
ACM
13 years 9 months ago
Programming Languages as Operating Systems (or Revenge of the Son of the Lisp Machine)
The MrEd virtual machine serves both as the implementation platform for the DrScheme programming environment, and as the underlying Scheme engine for executing expressions and pro...
Matthew Flatt, Robert Bruce Findler, Shriram Krish...