Sciweavers

1545 search results - page 201 / 309
» Opportunities in Opportunistic Computing
Sort
View
CCS
2007
ACM
14 years 4 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
CCS
2007
ACM
14 years 4 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
HUC
2007
Springer
14 years 4 months ago
Haggle: Seamless Networking for Mobile Applications
This paper presents Haggle, an architecture for mobile devices that enables seamless network connectivity and application functionality in dynamic mobile environments. Current appl...
Jing Su, James Scott, Pan Hui, Jon Crowcroft, Eyal...
HUC
2007
Springer
14 years 4 months ago
Rapidly Exploring Application Design Through Speed Dating
Abstract. While the user-centered design methods we bring from humancomputer interaction to ubicomp help sketch ideas and refine prototypes, few tools or techniques help explore di...
Scott Davidoff, Min Kyung Lee, Anind K. Dey, John ...
ICESS
2007
Springer
14 years 4 months ago
Face Detection on Embedded Systems
Over recent years automated face detection and recognition (FDR) have gained significant attention from the commercial and research sectors. This paper presents an embedded face de...
Abbas Bigdeli, Colin Sim, Morteza Biglari-Abhari, ...