Filters








286 Hits in 6.0 sec

Reminiscences on SOSP history day

Peter G. Neumann
2015 SOSP History Day 2015 on - SOSP '15  
In the committee for the COSINE-8 report proposing a core course on operating systems principles (1971), Butler took the protection topic.  ...  They did not mention a 9th principle, which appears in the Saltzer-Kaashoek book, Principles of Computer System Design (2009) --minimizing the part of the system that must be trusted.  ... 
doi:10.1145/2830903.2847551 dblp:conf/sosp/Neumann15 fatcat:dpgldgjc45bevkhkblpa5gxpo4

Brain Computer Interfaces for Mobile Apps: State-of-the-art and Future Directions [article]

Sumit Soman, Siddharth Srivastava, Saurabh Srivastava, Nitendra Rajput
2015 arXiv   pre-print
This paper consolidates research directions being pursued in this domain, and draws conclusions on feasibility and benefits of using BCI systems effectively augmented to the mobile application development  ...  We present a comprehensive survey of the state-of-the-art in this area, discussing the challenges and limitations in using BCI for mobile applications.  ...  Proceedings of the 13th annual ACM symposium on User interface software and technology, ACM, pp 129– 137. [58] Wei Q, Zou X, Lu Z, Wang Z (2014) Design and implementation of a mental telephone system  ... 
arXiv:1509.01338v1 fatcat:qwnikabsebd3pnx7npplycy4ba

Long-Term Personalization of an In-Home Socially Assistive Robot for Children With Autism Spectrum Disorders

Caitlyn Clabaugh, Kartik Mahajan, Shomik Jain, Roxanna Pakkar, David Becerra, Zhonghao Shi, Eric Deng, Rhianna Lee, Gisele Ragusa, Maja Matarić
2019 Frontiers in Robotics and AI  
Moreover, all child users were engaged for a majority of the intervention, and their families reported the SAR system to be useful and adaptable.  ...  We instantiated and evaluated the approach in a study with 17 children with ASD, aged 3-7 years old, over month-long interventions in their homes.  ...  “Brain points: a growth mindset incentive structure boosts persistence in an educational game,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, ON: ACM), 3339–3348  ... 
doi:10.3389/frobt.2019.00110 pmid:33501125 pmcid:PMC7805891 fatcat:ytpp5yqpbfa3ldtzcarmmy7ehi

Disconnected operation in the Coda file system

James J. Kistler, M. Satyanarayanan
1991 Proceedings of the thirteenth ACM symposium on Operating systems principles - SOSP '91  
In this paper, we show that disconnected operation is feasible, efficient and usable by describing its design and implementation in the Coda File System.  ...  The central idea behind our work is that caching of data, now widely used for performance, can also be exploited to improve availability.  ...  In Proceedings of the 9th ACM Symposium on Operating System Principles (Bretton Woods, N. H., Oct. 1983), pp. 49-70.  ... 
doi:10.1145/121132.121166 dblp:conf/sosp/KistlerS91 fatcat:7i4xxovainambjrnb46krp5eve

Disconnected operation in the Coda File System

James J. Kistler, M. Satyanarayanan
1992 ACM Transactions on Computer Systems  
In this paper, we show that disconnected operation is feasible, efficient and usable by describing its design and implementation in the Coda File System.  ...  The central idea behind our work is that caching of data, now widely used for performance, can also be exploited to improve availability.  ...  In Proceedings of the 9th ACM Symposium on Operating System Principles (Bretton Woods, N. H., Oct. 1983), pp. 49-70.  ... 
doi:10.1145/146941.146942 fatcat:7e7evjr3ybcfzpgjbxeku2ijse

Disconnected operation in the Coda file system

James J. Kistler, M. Satyanarayanan
1991 ACM SIGOPS Operating Systems Review  
In this paper, we show that disconnected operation is feasible, efficient and usable by describing its design and implementation in the Coda File System.  ...  The central idea behind our work is that caching of data, now widely used for performance, can also be exploited to improve availability.  ...  In Proceedings of the 9th ACM Symposium on Operating System Principles (Bretton Woods, N. H., Oct. 1983), pp. 49-70.  ... 
doi:10.1145/121133.121166 fatcat:yozggmkzinb37dat74kn54dr7m

Invalidation-Based Protocols for Replicated Datastores [article]

Antonios Katsarakis
2021 arXiv   pre-print
In other words, the common operating environment inside a datacenter closely resembles that of a multiprocessor.  ...  Based on this insight, we draw inspiration from the multiprocessor for high-performance, strongly consistent replication in the datacenter.  ...  In Proceedings of the 27th ACM Symposium on Operating Systems Principles, SOSP 176 Bibliography ’19, pages 399–413, USA, 2019. ACM.  ... 
arXiv:2112.02405v1 fatcat:toi3wflouvbzngpdfzypw3l4li

The 108th Technical Conference

1970 SMPTE Motion Imaging Journal  
Short Film Subjects Each morning and afternoon session of the conference as a whole, that is the general papers sessions, the sessions of the CATV Symposium and even the equip- ment papers session, was  ...  Flaherty’s responsibility in- cluded the 12 papers sessions, which were highlighted by many teresting presentations (to some of which we will come back later in this report), and G.  ... 
doi:10.5594/j00858 fatcat:ag6pctp6tvgjjnfx3hzmvqj2za

Modeling the Network Topology [chapter]

Matthias Wählisch
2010 Modeling and Tools for Network Simulation  
Thus, the rst step in selecting an appropriate topology is to clarify the scenario, in which the protocol will operate.  ...  The network topology and its properties are important ingredients for protocol and system evaluation. They should be chosen characteristic of the problem under observation.  ...  In MSWiM '07: Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, pages 159168, New York, NY, USA, 2007.  ... 
doi:10.1007/978-3-642-12331-3_22 fatcat:6vlg3uvcqrftzjk73gdjprs744

A Tangled World Wide Web of Security Issues

Joris Claessens, Bart Preneel, Joos Vandewalle
2002 First Monday  
Operating Systems Web browsers and servers are not the real end points in a secure Web application. The end points are the machines and the operating systems the browsers and servers are running on.  ...  Although some people are quite sceptical, improvements in the security of widely deployed operating systems might be anticipated in the long term.  ... 
doi:10.5210/fm.v7i3.935 fatcat:cssxalxebrcthadbtyi5epz4ma

A Systematic Review on Architecting for Software Evolvability

Hongyu Pei Breivold, Ivica Crnkovic
2010 2010 21st Australian Software Engineering Conference  
Review protocol We formulated a review protocol based on the guidelines and procedures as proposed in [29] .  ...  In this paper, we undertake a systematic review to obtain an overview of the existing studies in promoting software evolvability at architectural level.  ...  with 9th ACM SIGSOFT international symposium on Foundations of software engineering 1 1.7 Total 58 100 Table 2 . 2 Summary of Quality Considerations Support during Software Architecture  ... 
doi:10.1109/aswec.2010.11 dblp:conf/aswec/BreivoldC10 fatcat:ulnian6acvg4xbusnpl5q4yhnq

Emerging technologies that support a software process life cycle

G. T. Heineman, J. E. Botsford, G. Caldiera, G. E. Kaiser, M. I. Kellner, N. H. Madhavji
1994 IBM Systems Journal  
Gruhn, “Managing Software Processes in the Environment Melmac,” Proceedings of the 4th ACM SIGSOFT Symposium on Software Development Environments, Irvine, CA, December 1990, R. N.  ...  Presen- tation in Session Three, Advanced Track. . H. Krasner et al., “Lessons Learned from a Software Process Modeling System,” Communications of the ACM 35, No. 9, 91-100 (September 1992). . T. K.  ... 
doi:10.1147/sj.333.0501 fatcat:uu2pzaufmzga3lt6my5ooykurm

Activity Explorer: Activity-centric collaboration from research to product

W. Geyer, M. J. Muller, M. T. Moore, E. Wilcox, L.-T. Cheng, B. Brownholtz, C. Hill, D. R. Millen
2006 IBM Systems Journal  
Moran, “Unified Activity Management: Explicitly Representing Activity in Work-Support Systems,” Posi- tion paper at the 9th European Conference on Computer- Supported Cooperative Work, “Workshop on Activity  ...  Mackay, “More Than Just a Communication System: Diversity in the Use of Electronic Mail,” Proceedings of the ACM Conference on Computer Sup- ported Cooperative Work, Portland, Oregon (1988), pp. 344-353  ... 
doi:10.1147/sj.454.0713 fatcat:bo52joixwzhtznbteg4iqnwtbu

Multiple Criteria Decision Making

J. E. J., M. K. Starr, M. Zeleny
1978 Technometrics  
This special session aims to cover a wide range of works and recent advances on Hybrid Artificial Intelligent Systems applied to ordinal regression.  ...  They belong to the IEEE Symposium Series on Computational Intelligence. The next Symposium will take place in Singapore in April 2013 (http://www.ntu.edu.sg/home/epnsugan/index_files/SSCI2 013/).  ...  where other information and opinion articles could appear in order to create a more lively atmosphere within the group.  ... 
doi:10.2307/1268169 fatcat:gwqe2ntnarad5ise5vpbmruk3a

Comparing Type Systems for Deadlock Freedom [article]

Ornela Dardha, Jorge A. Pérez
2021 arXiv   pre-print
The class K, obtained by encoding session types into Kobayashi's linear types with usages, includes processes not typable in other type systems.  ...  The class L stands out for its canonicity: it results from Curry-Howard interpretations of linear logic propositions as session types.  ...  We thank Bas van den Heuvel for his help in designing Figure 1 . is work was partially supported by the EU COST Action IC1201 (Behavioural Types for Reliable Large-Scale So ware Systems  ... 
arXiv:1810.00635v4 fatcat:lbhkd4ss6zardhwujtvgtcqmk4
« Previous Showing results 1 — 15 out of 286 results