Sciweavers

201 search results - page 8 / 41
» Information security in networkable Windows-based operating ...
Sort
View
PERCOM
2010
ACM
13 years 7 months ago
Cloud-assisted mobile desktop search
—With the advent of the Internet, searching for information became a fundamental part of our daily computing. When large storage devices were integrated to our personal computers...
Eemil Lagerspetz, Sasu Tarkoma
OSDI
2008
ACM
14 years 9 months ago
Live Migration of Direct-Access Devices
Virtual machine migration greatly aids management by allowing flexible provisioning of resources and decommissioning of hardware for maintenance. However, efforts to improve netwo...
Asim Kadav, Michael M. Swift
CSREASAM
2008
13 years 10 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
SISW
2005
IEEE
14 years 2 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
TASE
2008
IEEE
13 years 9 months ago
Group Elevator Scheduling With Advance Information for Normal and Emergency Modes
Group elevator scheduling has long been recognized as an important problem for building transportation efficiency, since unsatisfactory elevator service is one of the major complai...
Peter B. Luh, Bo Xiong, Shi-Chung Chang