Sciweavers

4172 search results - page 591 / 835
» Computing Machinery and Understanding
Sort
View
TEI
2010
ACM
163views Hardware» more  TEI 2010»
15 years 11 months ago
Action and representation in tangible systems: implications for design of learning interactions
In tangible learning systems, the facility to promote physically active engagement highlights the need to understand how different designs impact on action and interaction, and th...
Sara Price, Jennifer G. Sheridan, Taciana Pontual ...
TEI
2010
ACM
199views Hardware» more  TEI 2010»
15 years 11 months ago
Revealing the invisible: visualizing the location and event flow of distributed physical devices
Distributed physical user interfaces comprise networked sensors, actuators and other devices attached to a variety of computers in different locations. Developing such systems is ...
Nicolai Marquardt, Tom Gross, M. Sheelagh T. Carpe...
122
Voted
ACSAC
2009
IEEE
15 years 11 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
POPL
2009
ACM
15 years 11 months ago
Speculative N-Way barriers
Speculative execution is an important technique that has historically been used to extract concurrency from sequential programs. While techniques to support speculation work well ...
Lukasz Ziarek, Suresh Jagannathan, Matthew Fluet, ...
CCS
2009
ACM
15 years 11 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...