Sciweavers

2214 search results - page 424 / 443
» Initial Design of the
Sort
View
109
Voted
USS
2008
15 years 3 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
103
Voted
CIKM
2008
Springer
15 years 2 months ago
Active relevance feedback for difficult queries
Relevance feedback has been demonstrated to be an effective strategy for improving retrieval accuracy. The existing relevance feedback algorithms based on language models and vect...
Zuobing Xu, Ram Akella
CHI
2005
ACM
15 years 2 months ago
Urban probes: encountering our emerging urban atmospheres
Urban Atmospheres captures a unique, synergistic moment – expanding urban populations, rapid adoption of Bluetooth mobile devices, tiny ad hoc sensor networks, and the widesprea...
Eric Paulos, Tom Jenkins
109
Voted
LCTRTS
2010
Springer
15 years 2 months ago
An efficient code update scheme for DSP applications in mobile embedded systems
DSP processors usually provide dedicated address generation units (AGUs) to assist address computation. By carefully allocating variables in the memory, DSP compilers take advanta...
Weijia Li, Youtao Zhang
CSCW
2008
ACM
15 years 2 months ago
Understanding collective play in an urban screen game
In recent years there has been a growing interest in urban screen applications. While there have been several deployments of these technologies in our urban environments, surprisi...
Kenton O'Hara, Maxine Glancy, Simon Robertshaw