Sciweavers

2259 search results - page 286 / 452
» Separation and information hiding
Sort
View
96
Voted
ASPLOS
2006
ACM
15 years 6 months ago
Recording shared memory dependencies using strata
Significant time is spent by companies trying to reproduce and fix bugs. BugNet and FDR are recent architecture proposals that provide architecture support for deterministic rep...
Satish Narayanasamy, Cristiano Pereira, Brad Calde...
161
Voted
ISWC
2005
IEEE
15 years 6 months ago
Using Ultrasonic Hand Tracking to Augment Motion Analysis Based Recognition of Manipulative Gestures
The paper demonstrates how ultrasonic hand tracking can be used to improve the performance of a wearable, accelerometer and gyroscope based activity recognition system. Specifica...
Georg Ogris, Thomas Stiefmeier, Holger Junker, Pau...
97
Voted
SACMAT
2005
ACM
15 years 6 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
87
Voted
ITRUST
2005
Springer
15 years 6 months ago
Interactive Credential Negotiation for Stateful Business Processes
Business Processes for Web Services are the new paradigm for lightweight enterprise integration. They cross organizational boundaries, are provided by entities that see each other ...
Hristo Koshutanski, Fabio Massacci
109
Voted
KI
2005
Springer
15 years 6 months ago
A Probabilistic Multimodal Sensor Aggregation Scheme Applied for a Mobile Robot
Dealing with methods of human-robot interaction and using a real mobile robot, stable methods for people detection and tracking are fundamental features of such a system and requir...
Erik Schaffernicht, Christian Martin, Andrea Schei...