Sciweavers

144 search results - page 14 / 29
» Cobalt: Separating Content Distribution from Authorization i...
Sort
View
GI
2004
Springer
14 years 1 months ago
An Architecture Concept for Mobile P2P File Sharing Services
Abstract: File-sharing in mobile networks has differing demands to a P2P architecture. Resource access and mediation techniques must follow constraints given in 2.5G/3G networks. E...
Frank-Uwe Andersen, Hermann de Meer, Ivan Dedinski...
MDM
2005
Springer
165views Communications» more  MDM 2005»
14 years 1 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
CCS
2010
ACM
13 years 6 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
HICSS
2005
IEEE
92views Biometrics» more  HICSS 2005»
14 years 1 months ago
Understanding Conflict in Virtual Teams: An Experimental Investigation using Content Analysis
Virtual teams are temporally and geographically dispersed groups, which may have members from varied cultures and backgrounds. Such diversity may cause intra-group conflicts in vi...
Souren Paul, Priya Seetharaman, Imad Samarah, Pete...
IDEAS
1998
IEEE
146views Database» more  IDEAS 1998»
13 years 12 months ago
The Design and Implementation of an Infrastructure for Multimedia Digital Libraries
We develop an infrastructure for managing, indexing and serving multimedia content in digital libraries. This infrastructure follows the model of the web, and thereby is distribut...
Arjen P. de Vries, Brian S. Eberman, David E. Kova...