Sciweavers

1130 search results - page 189 / 226
» Developing Trust In Virtual Software Development Teams
Sort
View
144
Voted
SECON
2007
IEEE
15 years 9 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald

Lecture Notes
4961views
17 years 1 months ago
The Relational Data Model, Normalisation and effective Database Design
I have been designing and building applications, including the databases used by those applications, for several decades now. I have seen similar problems approached by different d...
Tony Marston
CODES
2005
IEEE
15 years 9 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
117
Voted
ECOOP
2007
Springer
15 years 9 months ago
Generational Real-Time Garbage Collection
Abstract. While real-time garbage collection is now available in production virtual machines, the lack of generational capability means applications with high allocation rates are ...
Daniel Frampton, David F. Bacon, Perry Cheng, Davi...
123
Voted
VR
2003
IEEE
164views Virtual Reality» more  VR 2003»
15 years 8 months ago
VIS-Tracker: A Wearable Vision-Inertial Self-Tracker
We present a demonstrated and commercially viable self-tracker, using robust software that fuses data from inertial and vision sensors. Compared to infrastructurebased trackers, s...
Eric Foxlin, Leonid Naimark