Sciweavers

1342 search results - page 256 / 269
» MEMS Design And Verification
Sort
View
CCS
2009
ACM
16 years 12 days ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
CHI
2009
ACM
16 years 11 days ago
Amplifying community content creation with mixed initiative information extraction
Although existing work has explored both information extraction and community content creation, most research has focused on them in isolation. In contrast, we see the greatest le...
Raphael Hoffmann, Saleema Amershi, Kayur Patel, Fe...
MOBIHOC
2009
ACM
16 years 10 days ago
Characterizing the exit process of a non-saturated IEEE 802.11 wireless network
In this paper, we consider a non-saturated IEEE 802.11 based wireless network. We use a three-way fixed point to model the node behavior with Bernoulli packet arrivals and determi...
Punit Rathod, Onkar Dabeer, Abhay Karandikar, Anir...
POPL
2008
ACM
16 years 3 days ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
CADE
2005
Springer
16 years 2 days ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin