Sciweavers

1636 search results - page 126 / 328
» From Usability Lab to
Sort
View
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 10 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
TVCG
2008
112views more  TVCG 2008»
13 years 10 months ago
Vispedia: Interactive Visual Exploration of Wikipedia Data via Search-Based Integration
Abstract-Wikipedia is an example of the collaborative, semi-structured data sets emerging on the Web. These data sets have large, nonuniform schema that require costly data integra...
Bryan Chan, Leslie Wu, Justin Talbot, Mike Cammara...
ICRA
2010
IEEE
170views Robotics» more  ICRA 2010»
13 years 9 months ago
Towards marine bloom trajectory prediction for AUV mission planning
— This paper presents an oceanographic toolchain that can be used to generate multi-vehicle robotic surveys for large-scale dynamic features in the coastal ocean. Our science app...
Jnaneshwar Das, Kanna Rajany, Sergey Frolovy, Fred...
INFOCOM
2010
IEEE
13 years 9 months ago
INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding
—Wireless mesh networks have been widely deployed to provide broadband network access, and their performance can be significantly improved by using a new technology called netwo...
Tingting Chen, Sheng Zhong
MIDDLEWARE
2010
Springer
13 years 9 months ago
Anonygator: Privacy and Integrity Preserving Data Aggregation
Abstract. Data aggregation is a key aspect of many distributed applications, such as distributed sensing, performance monitoring, and distributed diagnostics. In such settings, use...
Krishna P. N. Puttaswamy, Ranjita Bhagwan, Venkata...