Sciweavers

2948 search results - page 217 / 590
» More Principled Design of Pervasive Computing Systems
Sort
View
TRUST
2009
Springer
15 years 11 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
SPAA
2003
ACM
15 years 10 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
CHI
1995
ACM
15 years 8 months ago
Interactive Sketching for the Early Stages of User Interface Design
Current interactive user interface construction tools are often more of a hindrance than a benefit during the early stages of user interface design. These tools take too much time...
James A. Landay, Brad A. Myers
ICDE
2010
IEEE
322views Database» more  ICDE 2010»
16 years 4 months ago
XML-Based Computation for Scientific Workflows
Scientific workflows are increasingly used for rapid integration of existing algorithms to form larger and more comgrams. Such workflows promise to provide more abstract, yet execu...
Bertram Ludäscher, Daniel Zinn, Shawn Bowers
WWW
2009
ACM
16 years 5 months ago
Computers and iphones and mobile phones, oh my!: a logs-based comparison of search users on different devices
We present a logs-based comparison of search patterns across three platforms: computers, iPhones and conventional mobile phones. Our goal is to understand how mobile search users ...
Maryam Kamvar, Melanie Kellar, Rajan Patel, Ya Xu