Sciweavers

511 search results - page 66 / 103
» Organization Detection Using Emergent Computing
Sort
View
CCS
2006
ACM
13 years 11 months ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
TEI
2010
ACM
129views Hardware» more  TEI 2010»
13 years 8 months ago
Silent mutations: physical-digital interactions in spaces
Many installations research efforts today explore how to engage participants with embedded digital content and applications in interactive environments. Yet the interactive design...
Claudia Rébola Winegarden, Nicholas Komor, ...
SIGOPS
2010
144views more  SIGOPS 2010»
13 years 6 months ago
The case for a versatile storage system
Storage systems in emerging large-scale (a.k.a. peta-scale) computing systems often introduce a performance or scalability bottleneck. To deal with these limitations we propose a ...
Samer Al-Kiswany, Abdullah Gharaibeh, Matei Ripean...
DAC
2004
ACM
14 years 8 months ago
Proxy-based task partitioning of watermarking algorithms for reducing energy consumption in mobile devices
Digital watermarking is a process that embeds an imperceptible signature or watermark in a digital file containing audio, image, text or video data. The watermark is later used to...
Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Ni...
JCB
2008
170views more  JCB 2008»
13 years 7 months ago
Efficiently Identifying Max-Gap Clusters in Pairwise Genome Comparison
The spatial clustering of genes across different genomes has been used to study important problems in comparative genomics, from identification of operons to detection of homologo...
Xu Ling, Xin He, Dong Xin, Jiawei Han