Sciweavers

2662 search results - page 200 / 533
» Tools Demonstrations
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 9 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
CHI
1998
ACM
15 years 9 months ago
The Vista Environment for the Coevolutionary Design of User Interfaces
User centered design requires the creation of numerous design artifacts such as task hierarchy, task-oriented specification, user interface design, architecture design and code. I...
Judy Brown, T. C. Nicholas Graham, Timothy N. Wrig...
WOTUG
2007
15 years 6 months ago
Modeling and Analysis of the AMBA Bus Using CSP and B
Abstract. In this paper, we present a formal model and analysis of the AMBA Advanced High-performance Bus (AHB) on-chip bus. The model is given in CSP B—an integration of the pro...
Alistair A. McEwan, Steve Schneider
ICN
2009
Springer
15 years 11 months ago
CoUniverse: Framework for Building Self-Organizing Collaborative Environments Using Extreme-Bandwidth Media Applications
Using internet for media-based real-time collaboration has become widespread activity. In this paper, we present a framework called CoUniverse, designed for building realtime user...
Milos Liska, Petr Holub
155
Voted
CCS
2010
ACM
15 years 5 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami