Sciweavers

2061 search results - page 325 / 413
» Authorization for Metacomputing Applications
Sort
View
EUROSYS
2007
ACM
16 years 1 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
CHI
2010
ACM
15 years 10 months ago
Embodied social proxy: mediating interpersonal connection in hub-and-satellite teams
Current business conditions have given rise to distributed teams that are mostly collocated except for one remote member. These “hub-and-satellite” teams face the challenge of...
Gina Venolia, John C. Tang, Ruy Cervantes, Sara Bl...
CHI
2010
ACM
15 years 10 months ago
LensMouse: augmenting the mouse with an interactive touch display
We introduce LensMouse, a novel device that embeds a touch-screen display – or tangible ‘lens’ – onto a mouse. Users interact with the display of the mouse using direct to...
Xing-Dong Yang, Edward Mak, David C. McCallum, Pou...
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
15 years 10 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
136
Voted
CC
2009
Springer
106views System Software» more  CC 2009»
15 years 10 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...