Sciweavers

252 search results - page 37 / 51
» Information-Flow Security for Interactive Programs
Sort
View
AGENTS
1997
Springer
15 years 1 months ago
Transportable Information Agents
Transportable agents are autonomous programs. They can move through a heterogeneous network of computers under their own control, migrating from host to host. They can sense the s...
Daniela Rus, Robert S. Gray, David Kotz
MHCI
2009
Springer
15 years 4 months ago
Hoverflow: exploring around-device interaction with IR distance sensors
By equipping a mobile device with distance sensing capabilities, we aim to expand the interaction possibilities of mobile and wearable devices beyond the confines of the physical ...
Sven G. Kratz, Michael Rohs
97
Voted
VIZSEC
2007
Springer
15 years 3 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
PPDP
2005
Springer
15 years 3 months ago
Trace effects and object orientation
fects are statically generated program abstractions, that can be model checked for verification of assertions in a temporal program logic. In this paper we develop a type and eff...
Christian Skalka
OOPSLA
1999
Springer
15 years 1 months ago
Reducing Transfer Delay Using Java Class File Splitting and Prefetching
The proliferation of the Internet is fueling the development of mobile computing environments in which mobile code is executed on remote sites. In such environments, the end user ...
Chandra Krintz, Brad Calder, Urs Hölzle