Sciweavers

14190 search results - page 2512 / 2838
» computing 2008
Sort
View
ICFP
2008
ACM
16 years 4 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
ICFP
2008
ACM
16 years 4 months ago
Functional translation of a calculus of capabilities
Reasoning about imperative programs requires the ability to track aliasing and ownership properties. We present a type system that provides this ability, by using regions, capabil...
Arthur Charguéraud, François Pottier
PERCOM
2008
ACM
16 years 4 months ago
Structured decomposition of adaptive applications
We describe an approach to automate certain highlevel implementation decisions in a pervasive application, allowing them to be postponed until run time. Our system enables a model...
Justin Mazzola Paluska, Hubert Pham, Umar Saif, Gr...
PERCOM
2008
ACM
16 years 4 months ago
CoWSAMI: Interface-aware context gathering in ambient intelligence environments
In this paper we present CoWSAMI, a middleware infrastructure that enables context awareness in open ambient intelligence environments, consisting of mobile users and context sour...
Dionysis Athanasopoulos, Apostolos Zarras, Valéri...
PERCOM
2008
ACM
16 years 4 months ago
IP Address Passing for VANETs
In Vehicular Ad-hoc Networks (VANETs), vehicles can gain short connections to the Internet by using wireless access points (AP). A significant part of the connection time is the t...
Todd Arnold, Wyatt Lloyd, Jing Zhao, Guohong Cao
« Prev « First page 2512 / 2838 Last » Next »