Sciweavers

722 search results - page 121 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
DRM
2007
Springer
15 years 6 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
GROUP
2005
ACM
15 years 5 months ago
Negotiated rhythms of mobile work: time, place, and work schedules
This study investigates the role of rhythms in the collaborative coordination of mobile work as well as in the individual actors’ comprehension and command of their work. Drawin...
Magnus Nilsson, Morten Hertzum
MM
2003
ACM
161views Multimedia» more  MM 2003»
15 years 5 months ago
MuSA.RT: music on the spiral array. real-time
We present MuSA.RT, Opus 1, a multimodal interactive system for music analysis and visualization using the Spiral Array model. Real-time MIDI input from a live performance is proc...
Elaine Chew, Alexandre R. J. François
ATAL
2010
Springer
15 years 27 days ago
Intelligent agents for the smart grid
The Intelligent Decentralised Energy-Aware Systems (iDEaS) project at the University of Southampton (see www.ideasproject.info) is developing and demonstrating the application of ...
Perukrishnen Vytelingum, Thomas Voice, Sarvapali D...
CORR
2008
Springer
79views Education» more  CORR 2008»
14 years 12 months ago
A System Theoretic Approach to Bandwidth Estimation
It is shown that bandwidth estimation in packet networks can be viewed in terms of min-plus linear system theory. The available bandwidth of a link or complete path is expressed i...
Jörg Liebeherr, Markus Fidler, Shahrokh Valae...