Sciweavers

2209 search results - page 223 / 442
» Language Based Secure Communication
Sort
View
INTERACT
2003
15 years 5 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
ASPLOS
2000
ACM
15 years 8 months ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin
ACL
1989
15 years 5 months ago
The Effects of Interaction on Spoken Discourse
Near-term spoken language systems willlikely be limited in their interactive capabilities. To design them, we shall need to model how the presence or absence of speaker interactio...
Sharon L. Oviatt, Philip R. Cohen
ISI
2003
Springer
15 years 9 months ago
Active Database Systems for Monitoring and Surveillance
In many intelligence and security tasks it is necessary to monitor data in database in order to detect certain events or changes. Currently, database systems offer triggers to pro...
Antonio Badia
TPHOL
2008
IEEE
15 years 10 months ago
Formalizing a Framework for Dynamic Slicing of Program Dependence Graphs in Isabelle/HOL
Slicing is a widely-used technique with applications in e.g. compiler technology and software security. Thus verification of algorithms in these areas is often based on the correc...
Daniel Wasserrab, Andreas Lochbihler