Sciweavers

224 search results - page 43 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
ACISP
2005
Springer
13 years 11 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
ENTCS
2007
113views more  ENTCS 2007»
13 years 6 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
POPL
2012
ACM
12 years 1 months ago
Towards a program logic for JavaScript
JavaScript has become the most widely used language for clientside web programming. The dynamic nature of JavaScript makes understanding its code notoriously difficult, leading t...
Philippa Gardner, Sergio Maffeis, Gareth David Smi...
VIS
2009
IEEE
154views Visualization» more  VIS 2009»
14 years 7 months ago
A User Study to Compare Four Uncertainty Visualization Methods for 1D and 2D Datasets
Many techniques have been proposed to show uncertainty in data visualizations. However, very little is known about their effectiveness in conveying meaningful information. In this ...
Jibonananda Sanyal, Song Zhang, Gargi Bhattachar...
WOTUG
2007
13 years 7 months ago
A Process Oriented Approach to USB Driver Development
Abstract. Operating-systems are the core software component of many modern computer systems, ranging from small specialised embedded systems through to large distributed operating-...
Carl G. Ritson, Fred R. M. Barnes