Sciweavers

2595 search results - page 474 / 519
» Addressing Computational Viewpoint Design
Sort
View
CCS
2011
ACM
12 years 10 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
DGO
2011
247views Education» more  DGO 2011»
12 years 10 months ago
Open government and e-government: democratic challenges from a public value perspective
We consider open government (OG) within the context of egovernment and its broader implications for the future of public administration. We argue that the current US Administratio...
Teresa M. Harrison, Santiago Guerrero, G. Brian Bu...
INFOCOM
2012
IEEE
12 years 15 days ago
CARPO: Correlation-aware power optimization in data center networks
—Power optimization has become a key challenge in the design of large-scale enterprise data centers. Existing research efforts focus mainly on computer servers to lower their ene...
Xiaodong Wang, Yanjun Yao, Xiaorui Wang, Kefa Lu, ...
CONEXT
2009
ACM
13 years 11 months ago
Cool-Tether: energy efficient on-the-fly wifi hot-spots using mobile phones
We consider the problem of providing ubiquitous yet affordable Internet connectivity to devices at home, at work, and on the move. In this context, we take advantage of two signif...
Ashish Sharma, Vishnu Navda, Ramachandran Ramjee, ...
CHI
2005
ACM
14 years 10 months ago
Work coordination, workflow, and workarounds in a medical context
In this paper we report an ethnographic study of workarounds--informal temporary practices for handling exceptions to normal workflow--in a hospital environment. Workarounds are a...
Marina Kobayashi, Susan R. Fussell, Yan Xiao, F. J...