Sciweavers

1175 search results - page 187 / 235
» Abstract computability and algebraic specification
Sort
View
PERCOM
2009
ACM
14 years 9 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
CHI
2006
ACM
14 years 9 months ago
Clipping lists and change borders: improving multitasking efficiency with peripheral information design
Information workers often have to balance many tasks and interruptions. In this work, we explore peripheral display techniques that improve multitasking efficiency by helping user...
Tara Matthews, Mary Czerwinski, George G. Robertso...
STOC
2001
ACM
119views Algorithms» more  STOC 2001»
14 years 9 months ago
Private approximation of NP-hard functions
d Abstract] Shai Halevi Robert Krauthgamer Eyal Kushilevitz Kobbi Nissim ? The notion of private approximation was introduced recently by Feigenbaum, Fong, Strauss and Wright. Inf...
Shai Halevi, Robert Krauthgamer, Eyal Kushilevitz,...
PERCOM
2003
ACM
14 years 8 months ago
Dynamic Application Composition: Customizing the Behavior of an Active Space
The proliferation of wireless networks, hand-held PCs, touch panels, large flat displays, sensors, and embedded devices is transforming traditional habitats and living spaces into...
Brian Ziebart, Manuel Román, Roy H. Campbel...
ESCIENCE
2007
IEEE
14 years 3 months ago
Connecting Scientific Data to Scientific Experiments with Provenance
As scientific workflows and the data they operate on, grow in size and complexity, the task of defining how those workflows should execute (which resources to use, where the resou...
Simon Miles, Ewa Deelman, Paul T. Groth, Karan Vah...