Sciweavers

4323 search results - page 555 / 865
» Callback Implementations in C
Sort
View
SACMAT
2004
ACM
15 years 10 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
SENSYS
2004
ACM
15 years 10 months ago
Sensor network-based countersniper system
An ad-hoc wireless sensor network-based system is presented that detects and accurately locates shooters even in urban environments. The system consists of a large number of cheap...
Gyula Simon, Miklós Maróti, Á...
SIGITE
2004
ACM
15 years 10 months ago
Experiences using tablet PCs in a programming laboratory
This experience report describes lessons learned using first generation tablet PCs to support active learning in an undergraduate computer science laboratory course. We learned th...
Stephen H. Edwards, N. Dwight Barnette
124
Voted
VAST
2004
ACM
15 years 10 months ago
Digital reconstruction of the Arrigo VII funerary complex
The results of a project aimed to the study, reconstruction and presentation to the public of a monument disassembled and dispersed, the mausoleum of the emperor Arrigo VII, are p...
Clara Baracchini, Antonio Brogi, Marco Callieri, L...
WMASH
2004
ACM
15 years 10 months ago
Proximity services supporting network virtual memory in mobile devices
Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the developm...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...