Sciweavers

5252 search results - page 927 / 1051
» Logic in Access Control
Sort
View
CHI
2009
ACM
16 years 4 months ago
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware
Indirect input techniques allow users to quickly access all parts of tabletop workspaces without the need for physical access; however, indirect techniques restrict the available ...
David Pinelle, Mutasem Barjawi, Miguel A. Nacenta,...
VLSID
2001
IEEE
144views VLSI» more  VLSID 2001»
16 years 4 months ago
Next Generation Network Processors
Networking hardware manufacturers face the dual demands of supporting ever increasing bandwidth requirements, while also delivering new features, such as the ability to implement ...
Deepak Kataria
MOBIHOC
2005
ACM
16 years 3 months ago
Link-layer salvaging for making routing progress in mobile ad hoc networks
IEEE 802.11 MAC, called the Distributed Coordination Function (DCF), employs carrier sensing to effectively avoid collisions, but this makes it difficult to maximally reuse the sp...
Chansu Yu, Kang G. Shin, Lubo Song
IEEEARES
2009
IEEE
15 years 10 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
CCGRID
2009
IEEE
15 years 10 months ago
The Eucalyptus Open-Source Cloud-Computing System
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC ...
Daniel Nurmi, Richard Wolski, Chris Grzegorczyk, G...