Sciweavers

603 search results - page 21 / 121
» Determining Accessibility Needs Through User Goals
Sort
View
CCS
2010
ACM
13 years 8 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
WSC
2008
13 years 10 months ago
Supporting simulation in industry through the application of grid computing
An increased need for collaborative research, together with continuing advances in communication technology and computer hardware, has facilitated the development of distributed s...
Navonil Mustafee, Simon J. E. Taylor
ICSM
1994
IEEE
13 years 12 months ago
Domain-Retargetable Reverse Engineering II: Personalized User Interfaces
The user interface is an integral part of any application. This is especially true for reverse engineering environments, since the understanding process depends both on the user&#...
Scott R. Tilley
INFOCOM
2010
IEEE
13 years 6 months ago
Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access Networks
We study the problem of finding the least-priced path (LPP) between a source and a destination in opportunistic spectrum access (OSA) networks. This problem is motivated by econo...
Tao Shu, Marwan Krunz
PET
2004
Springer
14 years 1 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny