Sciweavers

2111 search results - page 251 / 423
» How to Program Pervasive Systems
Sort
View
114
Voted
ICFP
2010
ACM
15 years 4 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
POPL
2001
ACM
16 years 3 months ago
Secure safe ambients
Secure Safe Ambients (SSA) are a typed variant of Safe Ambients [9], whose type system allows behavioral invariants of ambients to be expressed and verified. The most significant a...
Michele Bugliesi, Giuseppe Castagna
142
Voted
IFIP
2010
Springer
14 years 10 months ago
Resource Adaptive Distributed Information Sharing
We have designed, implemented and evaluated a resource adaptive distributed information sharing system where automatic adjustments are made internally in our information sharing sy...
Hans Vatne Hansen, Vera Goebel, Thomas Plagemann, ...
DIGITEL
2007
IEEE
15 years 10 months ago
Pedagogical Agents for Teacher Intervention in Educational Robotics Classes: Implementation Issues
Teachers working in robotics classes face a major problem: how to keep track on individual students’ or even small groups’ progress in a class of 30-40 students. A multi-agent...
Ilkka Jormanainen, Yuejun Zhang, Kinshuk, Erkki Su...
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 10 months ago
Web Application Scanners: Definitions and Functions
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
Elizabeth Fong, Vadim Okun