Sciweavers

25111 search results - page 5008 / 5023
» Information Systems
Sort
View
SAC
2010
ACM
14 years 9 months ago
A machine-checked soundness proof for an efficient verification condition generator
Verification conditions (VCs) are logical formulae whose validity implies the correctness of a program with respect to a specification. The technique of checking software properti...
Frédéric Vogels, Bart Jacobs 0002, F...
SADFE
2010
IEEE
14 years 9 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
SECON
2010
IEEE
14 years 9 months ago
SAND: Sectored-Antenna Neighbor Discovery Protocol for Wireless Networks
Abstract--Directional antennas offer many potential advantages for wireless networks such as increased network capacity, extended transmission range and reduced energy consumption....
Emad Felemban, Robert Murawski, Eylem Ekici, Sangj...
SOCIALCOM
2010
14 years 9 months ago
GDC: Group Discovery Using Co-location Traces
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...
UIST
2010
ACM
14 years 9 months ago
Multitoe: high-precision interaction with back-projected floors based on high-resolution multi-touch input
Tabletop applications cannot display more than a few dozen on-screen objects. The reason is their limited size: tables cannot become larger than arm's length without giving u...
Thomas Augsten, Konstantin Kaefer, René Meu...
« Prev « First page 5008 / 5023 Last » Next »