Sciweavers

152 search results - page 6 / 31
» Evaluation of Overcluttering Prevention Techniques for Mobil...
Sort
View
EUROSYS
2011
ACM
12 years 11 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
CHI
2008
ACM
13 years 10 months ago
Escape: a target selection technique using visually-cued gestures
Many mobile devices have touch-sensitive screens that people interact with using fingers or thumbs. However, such interaction is difficult because targets become occluded, and bec...
Koji Yatani, Kurt Partridge, Marshall W. Bern, Mar...
CSCWD
2009
Springer
14 years 17 days ago
Designing and evaluating interfaces for mobile groupware systems
Mobile cooperative systems can facilitate cooperation by improving the flexibility of usage. However, mobile devices present some constraints that become the design and implement...
Carla Diacui Medeiros Berkenbrock, Alexandre Parra...
DEXA
2009
Springer
138views Database» more  DEXA 2009»
14 years 2 months ago
Evaluating Non-In-Place Update Techniques for Flash-Based Transaction Processing Systems
Recently, flash memory is emerging as the storage device. With price sliding fast, the cost per capacity is approaching to that of SATA disk drives. So far flash memory has been ...
Yongkun Wang, Kazuo Goda, Masaru Kitsuregawa
BDA
2003
13 years 9 months ago
Memory Requirements for Query Execution in Highly Constrained Devices
Pervasive computing introduces data management requirements that must be tackled in a growingvariety of lightweight computing devices. Personal folders on chip, networks of sensor...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral