Sciweavers

1393 search results - page 225 / 279
» Group communication in the Amoeba distributed operating syst...
Sort
View
EDOC
2005
IEEE
14 years 2 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
CLUSTER
2003
IEEE
14 years 2 months ago
"Plug-and-Play" Cluster Computing Using Mac OS X
At UCLA's Plasma Physics Group, to achieve accessible computational power for our research goals, we developed the tools to build numerically-intensive parallel computing clu...
Dean E. Dauger, Viktor K. Decyk
DSVIS
2008
Springer
13 years 10 months ago
A Middleware for Seamless Use of Multiple Displays
Abstract. Current multi-display environments (MDEs) can be composed of displays with different characteristics (e.g. resolution, size) located in any position and at different angl...
Satoshi Sakurai, Yuichi Itoh, Yoshifumi Kitamura, ...
SIGCOMM
2010
ACM
13 years 9 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
14 years 2 months ago
Scatternet Formation of Bluetooth Ad Hoc Networks
Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this...
Bin Zhen, Jonghun Park, Yongsuk Kim