Sciweavers

753 search results - page 130 / 151
» Completing a (k - 1)-Assignment
Sort
View
ASPLOS
2010
ACM
14 years 1 months ago
Request behavior variations
A large number of user requests execute (often concurrently) within a server system. A single request may exhibit fluctuating hardware characteristics (such as instruction comple...
Kai Shen
CHI
2010
ACM
14 years 1 months ago
SensorTune: a mobile auditory interface for DIY wireless sensor networks
Wireless Sensor Networks (WSNs) allow the monitoring of activity or environmental conditions over a large area, from homes to industrial plants, from agriculture fields to forest...
Enrico Costanza, Jacques Panchard, Guillaume Zuffe...
CCS
2010
ACM
14 years 1 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
IDTRUST
2009
ACM
14 years 1 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
CCS
2009
ACM
14 years 1 months ago
Finding bugs in exceptional situations of JNI programs
Software flaws in native methods may defeat Java’s guarantees of safety and security. One common kind of flaws in native methods results from the discrepancy on how exceptions...
Siliang Li, Gang Tan