Sciweavers

43 search results - page 7 / 9
» Correcting Access Restrictions to a Consequence More Flexibl...
Sort
View
USENIX
2008
13 years 9 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox
CHI
2009
ACM
14 years 8 months ago
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware
Indirect input techniques allow users to quickly access all parts of tabletop workspaces without the need for physical access; however, indirect techniques restrict the available ...
David Pinelle, Mutasem Barjawi, Miguel A. Nacenta,...
SIGUCCS
2003
ACM
14 years 22 days ago
Marketing computer support services through relationship and training strategies
In 2002, Harvard University's Division of Continuing Education (DCE) expanded its computer lab facility. This expansion allowed DCE to change its previous policy of restricti...
Brandon Bentley, Valerie Dixon, Ilana Rozanes, Pat...
WCNC
2010
IEEE
13 years 11 months ago
Frequency Reuse Techniques for Attaining Both Coverage and High Spectral Efficiency in OFDMA Cellular Systems
—Inter-cell interference (ICI) is always a big obstacle to attain wide area coverage and high spectral efficiency in cellular systems. In this work we make a study of two well-kn...
Zheng Xie, Bernhard Walke
TC
2008
13 years 7 months ago
Improving Quality of VoIP Streams over WiMax
Real-time services such as VoIP are becoming popular and are major revenue earners for network service providers. These services are no longer confined to the wired domain and are ...
Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly