Sciweavers

5790 search results - page 943 / 1158
» Distributed programming with distributed authorization
Sort
View
CANDC
2007
ACM
14 years 2 months ago
Eye-balls: juggling with the virtual
The authors will introduce and demonstrate a novel computer vision based system for augmented performance. Unlike previous systems, which have primarily focused on `high art'...
Joe Marshall, Steve Benford, Tony P. Pridmore
ACMIDC
2009
14 years 2 months ago
Designing intergenerational mobile storytelling
Informal educational experiences with grandparents and other older adults can be an important component of childrens education, especially in circumstances where high quality educ...
Allison Druin, Benjamin B. Bederson, Alexander J. ...
WCNC
2010
IEEE
14 years 2 months ago
Differentiable Spectrum Partition for Fractional Frequency Reuse in Multi-Cell OFDMA Networks
To mitigate inter-cell interference (ICI) and achieve higher spectrum efficiency, fractional frequency reuse (FFR) has been widely adopted by the next generation wireless systems...
Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma P. ...
ICASSP
2009
IEEE
14 years 2 months ago
Optimized opportunistic multicast scheduling (OMS) over heterogeneous cellular networks
Optimized opportunistic multicast scheduling (OMS) has been studied previously by the authors for homogeneous cellular networks, where the problem of efficiently transmitting a co...
Tze-Ping Low, Man-On Pun, Yao-Win Peter Hong, C.-C...
ACSAC
2004
IEEE
14 years 2 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh