Sciweavers

1054 search results - page 71 / 211
» Secret Communication with Feedback
Sort
View
ASSETS
2000
ACM
15 years 2 months ago
A study of blind drawing practice: creating graphical information without the visual channel
Existing drawing tools for blind users give inadequate contextual feedback on the state of the drawing, leaving blind users unable to comprehend and successfully produce graphical...
Hesham M. Kamel, James A. Landay
MAS
1998
Springer
172views Communications» more  MAS 1998»
15 years 2 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
INFOCOM
2010
IEEE
14 years 8 months ago
Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks
—Neighbor discovery is a fundamental requirement and need be done frequently in underwater acoustic networks (UANs) with floating node mobility. In hostile environments, neighbo...
Rui Zhang, Yanchao Zhang
ISPW
1996
IEEE
15 years 2 months ago
Feedback, evolution and software technology
A 1968 study of the software process led, inter alia, to the observation that the software process constitutes a feedback system. Attempts at its management and improvement must t...
M. M. Lehman
CIDR
2009
139views Algorithms» more  CIDR 2009»
14 years 11 months ago
Inter-Operator Feedback in Data Stream Management Systems via Punctuation
High-volume, high-speed data streams may overwhelm the capabilities of stream processing systems; techniques such as data prioritization, avoidance of unnecessary processing and o...
Rafael Fernández-Moctezuma, Kristin Tufte, ...