Sciweavers

42 search results - page 4 / 9
» Characterization of Error-Tolerant Applications when Protect...
Sort
View
SIGCOMM
1998
ACM
14 years 23 days ago
Error Control Techniques for Interactive Low-Bit Rate Video Transmission over the Internet
A new retransmission-based error control technique is presented that does not incur any additional latency in frame playout times, and hence are suitable for interactive applicati...
Injong Rhee
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 3 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
SOUPS
2005
ACM
14 years 2 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
HASKELL
2008
ACM
13 years 9 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
MOBISYS
2009
ACM
14 years 9 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...