Sciweavers

4164 search results - page 824 / 833
» Application and desktop sharing
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
GROUP
2010
ACM
13 years 7 months ago
Coordination by avoidance: bringing things together and keeping them apart across hospital departments
Coordination is central in CSCW systems design, where it is often considered as a process of bringing artifacts and activities together and making them part of a larger system. In...
Naja Holten Møller, Paul Dourish
MICRO
2010
IEEE
189views Hardware» more  MICRO 2010»
13 years 7 months ago
A Dynamically Adaptable Hardware Transactional Memory
Most Hardware Transactional Memory (HTM) implementations choose fixed version and conflict management policies at design time. While eager HTM systems store transactional state in-...
Marc Lupon, Grigorios Magklis, Antonio Gonzá...
PIMRC
2010
IEEE
13 years 7 months ago
Contact surround in opportunistic networks
Abstract--Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant re...
Nadjet Belblidia, Marcelo Dias de Amorim, Jeremie ...
SRDS
2010
IEEE
13 years 7 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...