Sciweavers

4962 search results - page 982 / 993
» Connectivity in Sub-Poisson Networks
Sort
View
CHI
1994
ACM
15 years 3 months ago
User interface tools
A user interface software tool helps developers design and implement the user interface. Research on past tools has had enormous impact on today's developers--virtually all a...
Brad A. Myers, Dan R. Olsen
104
Voted
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
15 years 3 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
103
Voted
ACSC
2004
IEEE
15 years 3 months ago
A RMI Protocol for Aglets
Aglets is a mobile agent system that allows an agent to move with its code and execution state across the network to interact with other entities. Aglets utilizes Java RMI to supp...
Feng Lu, Kris Bubendorfer
CF
2006
ACM
15 years 3 months ago
An efficient cache design for scalable glueless shared-memory multiprocessors
Traditionally, cache coherence in large-scale shared-memory multiprocessors has been ensured by means of a distributed directory structure stored in main memory. In this way, the ...
Alberto Ros, Manuel E. Acacio, José M. Garc...
RTCSA
1995
IEEE
15 years 3 months ago
A timeliness-guaranteed kernel model-DREAM kernel-and implementation techniques
: An essential building-block for construction of future real-time computer systems (RTCS’s) is a timeliness-guaranteed operating system. The first co-author recently formulated ...
K. H. (Kane) Kim, Luiz F. Bacellar, Yuseok Kim, Ch...