Sciweavers

1363 search results - page 170 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
219
Voted
POPL
2004
ACM
16 years 3 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
PERCOM
2006
ACM
16 years 2 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
142
Voted
PERCOM
2005
ACM
16 years 2 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
IUI
2010
ACM
16 years 6 days ago
Speeding pointing in tiled widgets: understanding the effects of target expansion and misprediction
Target expansion is a pointing facilitation technique where the users target, typically an interface widget, is dynamically enlarged to speed pointing in interfaces. However, with...
Jaime Ruiz, Edward Lank
103
Voted
CSCW
2010
ACM
16 years 5 days ago
Eliciting and focusing geographic volunteer work
Open content communities such as wikis derive their value from the work done by users. However, a key challenge is to elicit work that is sufficient and focused where needed. We ...
Reid Priedhorsky, Mikhil Masli, Loren G. Terveen