31![NEWSLETTER - CALL FOR SUBMISSIONS ACM Computers and Society – General Issue Newsletter Submission Deadline: April 15, 2015 Expected Publication Date: June 15, 2015 SIGCAS is the ACM Special Interest Group on Computers NEWSLETTER - CALL FOR SUBMISSIONS ACM Computers and Society – General Issue Newsletter Submission Deadline: April 15, 2015 Expected Publication Date: June 15, 2015 SIGCAS is the ACM Special Interest Group on Computers](https://www.pdfsearch.io/img/07c881f0c3d51f8466ef14741c1b709e.jpg) | Add to Reading ListSource URL: www.sigcas.orgLanguage: English - Date: 2015-01-20 02:10:43
|
---|
32![X GEO Plenary Session Session 6. Thursday, 16/1. 8h:30 Intervention (Brazil) Madam Chair, X GEO Plenary Session Session 6. Thursday, 16/1. 8h:30 Intervention (Brazil) Madam Chair,](https://www.pdfsearch.io/img/bd3dd3c8f4aed465eb1df77ca477017d.jpg) | Add to Reading ListSource URL: www.earthobservations.orgLanguage: English - Date: 2014-01-29 04:17:58
|
---|
33![Distributed Dynamical Omnicast Routing Felix Schill Uwe R. Zimmer Research School of Information Sciences and Engineering, Autonomous Underwater Robotics Research Group, Distributed Dynamical Omnicast Routing Felix Schill Uwe R. Zimmer Research School of Information Sciences and Engineering, Autonomous Underwater Robotics Research Group,](https://www.pdfsearch.io/img/d28ac840683df0ab1d50054ffbe3021e.jpg) | Add to Reading ListSource URL: www.complex-systems.comLanguage: English - Date: 2012-09-20 14:37:03
|
---|
34![Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University](https://www.pdfsearch.io/img/6e87d7f440a6cab479714d27507779d7.jpg) | Add to Reading ListSource URL: www.gilvegliach.itLanguage: English - Date: 2014-02-20 13:15:14
|
---|
35![From propositional to first-order monitoring Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA? Software Systems Research Group, 2 Australian National University From propositional to first-order monitoring Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA? Software Systems Research Group, 2 Australian National University](https://www.pdfsearch.io/img/def9707fec0d2d12fa1e518760833ae4.jpg) | Add to Reading ListSource URL: www.gilvegliach.itLanguage: English - Date: 2014-02-20 13:15:15
|
---|
36![From propositional to first-order monitoring Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA? Software Systems Research Group, 2 Australian National University From propositional to first-order monitoring Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA? Software Systems Research Group, 2 Australian National University](https://www.pdfsearch.io/img/984b9d037578dafb51308db64452647c.jpg) | Add to Reading ListSource URL: kuester.multics.orgLanguage: English - Date: 2015-05-08 04:15:01
|
---|
37![The Face in Activity Analysis and Gesture Interfaces Alejandro Jaimes FXPAL Japan, Corporate Research Group, Fuji Xerox Co., Ltd., Japan ABSTRACT In this paper we discuss two systems we have developed and The Face in Activity Analysis and Gesture Interfaces Alejandro Jaimes FXPAL Japan, Corporate Research Group, Fuji Xerox Co., Ltd., Japan ABSTRACT In this paper we discuss two systems we have developed and](https://www.pdfsearch.io/img/f7ee88745a390b88616b427fd418b4b4.jpg) | Add to Reading ListSource URL: www.bartneck.deLanguage: English - Date: 2008-03-08 09:00:31
|
---|
38![Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University](https://www.pdfsearch.io/img/362c83a6787249d74ca30c4519ef82da.jpg) | Add to Reading ListSource URL: kuester.multics.orgLanguage: English - Date: 2015-05-08 04:15:01
|
---|
39![Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems Jason I. Hong, Jennifer D. Ng, Scott Lederer Group for User Interface Research Computer Science Division University of California, Berkeley Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems Jason I. Hong, Jennifer D. Ng, Scott Lederer Group for User Interface Research Computer Science Division University of California, Berkeley](https://www.pdfsearch.io/img/f67b7e031100c5193566a1c82bc6eb7c.jpg) | Add to Reading ListSource URL: www.cs.cmu.eduLanguage: English - Date: 2004-06-03 15:58:25
|
---|
40![Membrane systems as a rule based modelling framework for multi-compartmental stochastic and discrete systems Agustín Riscos-Núñez Research Group on Natural Computing Department of Computer Science and Artificial Intel Membrane systems as a rule based modelling framework for multi-compartmental stochastic and discrete systems Agustín Riscos-Núñez Research Group on Natural Computing Department of Computer Science and Artificial Intel](https://www.pdfsearch.io/img/d3cb1530435c7e786806e77dbe427b34.jpg) | Add to Reading ListSource URL: www.math.utu.fiLanguage: English - Date: 2014-10-07 08:49:24
|
---|