Sciweavers

3979 search results - page 26 / 796
» Wild control operators
Sort
View
AML
2000
82views more  AML 2000»
14 years 9 months ago
Mixed logic and storage operators
In 1990 J-L. Krivine introduced the notion of storage operators. They are -terms which simulate call-by-value in the call-by-name strategy and they can be used in order to modeliz...
Karim Nour
CCS
2006
ACM
15 years 1 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
USENIX
2000
14 years 11 months ago
Techniques for the Design of Java Operating Systems
Language-basedextensible systems, such as Java Virtual Machines and SPIN, use type safety to provide memory safety in a single address space. By using software to provide safety, ...
Godmar Back, Patrick Tullmann, Leigh Stoller, Wils...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 4 months ago
AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations
—Sensor network MAC protocols usually employ periodic sleep and wakeup, achieving low duty-cycle to save energy and to increase the lifetime of battery-powered sensor devices. Ho...
Sang Hoon Lee, Joon Ho Park, Lynn Choi
ASSETS
2005
ACM
14 years 11 months ago
How to operate a PC without using the hands
A demo of a biosignal interface, which allows to operate a Windows r PC without using the hands, shall be given. The system – called HaMCoS (for Hands-free Mouse Control System)...
Torsten Felzer, Rainer Nordmann