Sciweavers

232 search results - page 18 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
SIGMETRICS
2002
ACM
13 years 9 months ago
Full-system timing-first simulation
Computer system designers often evaluate future design alternatives with detailed simulators that strive for functional fidelity (to execute relevant workloads) and performance fi...
Carl J. Mauer, Mark D. Hill, David A. Wood
CHI
2006
ACM
14 years 10 months ago
Support for activity-based computing in a personal computing operating system
Research has shown that computers are notoriously bad at supporting the management of parallel activities and interruptions, and that mobility increases the severity and scope of ...
Jakob E. Bardram, Jonathan Bunde-Pedersen, Mads S&...
TON
2008
75views more  TON 2008»
13 years 9 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
CHI
2008
ACM
14 years 10 months ago
MySong: automatic accompaniment generation for vocal melodies
We introduce MySong, a system that automatically chooses chords to accompany a vocal melody. A user with no musical experience can create a song with instrumental accompaniment ju...
Ian Simon, Dan Morris, Sumit Basu
SRDS
2007
IEEE
14 years 4 months ago
PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations
The increasing complexity and dynamics of grid environments have posed great challenges for secure and privacy-preserving collaboration in a virtual organization. In this paper, w...
Jianxin Li, Jinpeng Huai, Chunming Hu