Sciweavers

1456 search results - page 263 / 292
» Keeping encountered information
Sort
View
CHI
2011
ACM
13 years 2 months ago
Surfpad: riding towards targets on a squeeze film effect
We present Surfpad, a pointing facilitation technique that does not decrease target distance or increase target width in either control or display space. This new technique operat...
Géry Casiez, Nicolas Roussel, Romuald Vanbe...
PODS
2011
ACM
163views Database» more  PODS 2011»
13 years 1 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
EMSOFT
2011
Springer
12 years 10 months ago
Aciom: application characteristics-aware disk and network i/o management on android platform
The last several years have seen a rapid increase in smart phone use. Android offers an open-source software platform on smart phones, that includes a Linux-based kernel, Java app...
Hyosu Kim, Minsub Lee, Wookhyun Han, Kilho Lee, In...
CODASPY
2012
12 years 6 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
EUROSYS
2006
ACM
14 years 7 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...