Sciweavers

2089 search results - page 328 / 418
» Simulation Based Construction Management Learning System
Sort
View
CHI
1997
ACM
15 years 2 months ago
A Computer Participant in Musical Improvisation
the changing roles of participants in a musical improvisation and synchronously generate appropriate contributions of its own. Musical improvisation is a collaborative activity ana...
William F. Walker
IH
1998
Springer
15 years 2 months ago
Secure Copyright Protection Techniques for Digital Images
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
Alexander Herrigel, Joseph Ó Ruanaidh, Holg...
ICSE
2008
IEEE-ACM
15 years 10 months ago
A tale of four kernels
The Freebsd, gnu/Linux, Solaris, and Windows operating systems have kernels that provide comparable facilities. Interestingly, their code bases share almost no common parts, while...
Diomidis Spinellis
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 2 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
ICDIM
2007
IEEE
15 years 4 months ago
Remote instrument control with CIMA Web services and Web 2.0 technology
—The Common Instrument Middleware Architecture (CIMA) model for Web services based monitoring of remote scientific instruments is being extended and enhanced to provide a capabil...
Douglas du Boulay, Clinton Chee, Kenneth Chiu, Ric...