Sciweavers

2429 search results - page 402 / 486
» Using Aspects to Design a Secure System
Sort
View
MOBISYS
2008
ACM
15 years 9 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
ICCS
2001
Springer
15 years 2 months ago
Optimizing Sparse Matrix Computations for Register Reuse in SPARSITY
Abstract. Sparse matrix-vector multiplication is an important computational kernel that tends to perform poorly on modern processors, largely because of its high ratio of memory op...
Eun-Jin Im, Katherine A. Yelick
RIAO
2007
14 years 11 months ago
Structured Audio Player: Supporting Radio Archive Workflows with Automatically Generated Structure Metadata
Although techniques to automatically generate metadata have been steadily refined over the past decade, archive professionals at radio broadcasters continue to use conventional au...
Martha Larson, Joachim Köhler
ICSM
2009
IEEE
15 years 4 months ago
A statistical examination of the evolution and properties of libre software
How and why does software evolve? This question has been under study since almost 40 years ago, and it is still a subject of controversy. In the seventies, Meir M. Lehman formulat...
Israel Herraiz
ICAT
2006
IEEE
15 years 3 months ago
Exploring Human-Robot Interaction Through Telepresence Board Games
Abstract. This paper presents an experimental test bed for exploring and evaluating human-robot interaction (HRI). Our system is designed around the concept of playing board games ...
Min Xin, Ehud Sharlin