Sciweavers

1234 search results - page 200 / 247
» Privacy-preserving Virtual Machine
Sort
View
121
Voted
CW
2003
IEEE
15 years 9 months ago
PRESENCE : The Sense of Believability of Inaccessible Worlds
With the development of new instruments as telecommunication, teleoperation, computer representation tools, human beings are commonly in situation to perceive and act on spaces th...
Annie Luciani, Daniela Urma, Sylvain Marliè...
112
Voted
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
15 years 8 months ago
Project JXTA-C: Enabling a Web of Things
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...
118
Voted
ICPPW
2003
IEEE
15 years 8 months ago
Load Balancing on PC Clusters with the Super-Programming Model
Recent work in high-performance computing has shifted attention to PC clusters.. For PC-clusters, member nodes are independent computers connected by generalpurpose networks. The ...
Dejiang Jin, Sotirios G. Ziavras
172
Voted
NDSS
2003
IEEE
15 years 8 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
SCAM
2003
IEEE
15 years 8 months ago
Design and Implementation of Bytecode-based Java Slicing System
Program slice is a set of statements that affect the value of variable v in a statement s. In order to calculate a program slice, we must know the dependence relations between sta...
Fumiaki Umemori, Kenji Konda, Reishi Yokomori, Kat...