Sciweavers

2250 search results - page 352 / 450
» Authorizing applications in singularity
Sort
View
136
Voted
ICDE
2010
IEEE
247views Database» more  ICDE 2010»
16 years 4 months ago
Efficient Verification of Shortest Path Search via Authenticated Hints
Shortest path search in transportation networks is unarguably one of the most important online search services nowadays (e.g., Google Maps, MapQuest, etc), with applications spanni...
Man Lung Yiu, Yimin Lin, Kyriakos Mouratidis
EUROSYS
2009
ACM
16 years 1 months ago
Isolating web programs in modern browser architectures
Many of today’s web sites contain substantial amounts of client-side code, and consequently, they act more like programs than simple documents. This creates robustness and perfo...
Charles Reis, Steven D. Gribble
EUROSYS
2007
ACM
16 years 1 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
CHI
2010
ACM
15 years 11 months ago
Embodied social proxy: mediating interpersonal connection in hub-and-satellite teams
Current business conditions have given rise to distributed teams that are mostly collocated except for one remote member. These “hub-and-satellite” teams face the challenge of...
Gina Venolia, John C. Tang, Ruy Cervantes, Sara Bl...
CHI
2010
ACM
15 years 11 months ago
LensMouse: augmenting the mouse with an interactive touch display
We introduce LensMouse, a novel device that embeds a touch-screen display – or tangible ‘lens’ – onto a mouse. Users interact with the display of the mouse using direct to...
Xing-Dong Yang, Edward Mak, David C. McCallum, Pou...