Sciweavers

2513 search results - page 313 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
IUI
1998
ACM
15 years 5 months ago
Coherent Gestures, Locomotion, and Speech in Life-like Pedagogical Agents
Life-likeanimatedinterfaceagentsforknowledge-basedlearning environments can provide timely, customized advice to support students’ problem solving. Because of their strong visua...
Stuart G. Towns, Jennifer L. Voerman, Charles B. C...
112
Voted
FASE
2009
Springer
15 years 4 months ago
Enhanced Property Specification and Verification in BLAST
Model checking tools based on the iterative refinement of predicate abstraction (e.g., Slam and Blast) often feature a specification language for expressing complex behavior rules....
Ondrej Sery
HOTOS
2007
IEEE
15 years 4 months ago
Purely Functional System Configuration Management
System configuration management is difficult because systems evolve in an undisciplined way: packages are upgraded, configuration files are edited, and so on. The management of ex...
Eelco Dolstra, Armijn Hemel
ARCS
2004
Springer
15 years 4 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
119
Voted
CASES
2006
ACM
15 years 4 months ago
Efficient architectures through application clustering and architectural heterogeneity
Customizing architectures for particular applications is a promising approach to yield highly energy-efficient designs for embedded systems. This work explores the benefits of arc...
Lukasz Strozek, David Brooks