Sciweavers

2429 search results - page 387 / 486
» Using Aspects to Design a Secure System
Sort
View
CASES
2010
ACM
14 years 8 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
SIGSOFT
2004
ACM
15 years 10 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
CHI
2010
ACM
15 years 4 months ago
Contravision: exploring users' reactions to futuristic technology
How can we best explore the range of users' reactions when developing future technologies that maybe controversial, such as personal healthcare systems? Our approach – Cont...
Clara Mancini, Yvonne Rogers, Arosha K. Bandara, T...
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
15 years 4 months ago
A Policy for Open-Loop Attenuation of Disturbance Effects Caused by Uncertain Ground Properties in Running
— Outside of the laboratory, accurate models of ground impact dynamics are either difficult or impossible to obtain. Instead, a rigid ground model is often used in gait and cont...
Jonathan W. Hurst, Benjamin Morris, Joel E. Chestn...
SIGDOC
2005
ACM
15 years 3 months ago
Animating pervasive computing
It is difficult to present new, complex ideas in ways that are informative and interesting in situations where a vast amount of information has to be delivered and understood quic...
Andrée Woodcock, John R. Burns, Sarah Mount...