Sciweavers

13717 search results - page 2527 / 2744
» Control Systems
Sort
View
112
Voted
HASKELL
2008
ACM
15 years 4 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
126
Voted
PODS
2010
ACM
197views Database» more  PODS 2010»
15 years 3 months ago
When data dependencies over SQL tables meet the logics of paradox and S-3
We study functional and multivalued dependencies over SQL tables with NOT NULL constraints. Under a no-information interpretation of null values we develop tools for reasoning. We...
Sven Hartmann, Sebastian Link
SIGCOMM
2010
ACM
15 years 3 months ago
Efficient error estimating coding: feasibility and applications
Motivated by recent emerging systems that can leverage partially correct packets in wireless networks, this paper investigates the novel concept of error estimating codes (EEC). W...
Binbin Chen, Ziling Zhou, Yuda Zhao, Haifeng Yu
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
15 years 3 months ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...
TEI
2010
ACM
129views Hardware» more  TEI 2010»
15 years 3 months ago
Silent mutations: physical-digital interactions in spaces
Many installations research efforts today explore how to engage participants with embedded digital content and applications in interactive environments. Yet the interactive design...
Claudia Rébola Winegarden, Nicholas Komor, ...
« Prev « First page 2527 / 2744 Last » Next »