Sciweavers

257 search results - page 31 / 52
» Extending Java for Package based Access Control
Sort
View
ISI
2006
Springer
15 years 1 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
MMMACNS
2005
Springer
15 years 7 months ago
Self-managed Cells for Ubiquitous Systems
Abstract. Amongst the challenges of ubiquitous computing is the need to provide management support for personal wireless devices and sensors. In this extended abstract we introduce...
Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe S...
128
Voted
AAI
2002
161views more  AAI 2002»
15 years 1 months ago
Scripting Affective Communication with Life-Like Characters in Web-Based Interaction Systems
In this paper, we discuss scripting tools that aim at facilitating the design of web-based interactions with animated characters capable of affective communication. Specifically, ...
Helmut Prendinger, Sylvain Descamps, Mitsuru Ishiz...
CGO
2007
IEEE
15 years 8 months ago
Run-Time Support for Optimizations Based on Escape Analysis
The JavaTM programming language does not allow the programmer to influence memory management. An object is usually allocated on the heap and deallocated by the garbage collector ...
Thomas Kotzmann, Hanspeter Mössenböck
ACSW
2007
15 years 3 months ago
Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research
An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is bei...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...