Sciweavers

1362 search results - page 243 / 273
» Personalized location-based services
Sort
View
144
Voted
SOSP
2003
ACM
16 years 16 days ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
129
Voted
SOSP
2003
ACM
16 years 16 days ago
Improving the reliability of commodity operating systems
Despite decades of research in extensible operating system technology, extensions such as device drivers remain a significant cause of system failures. In Windows XP, for example,...
Michael M. Swift, Brian N. Bershad, Henry M. Levy
148
Voted
HRI
2009
ACM
15 years 10 months ago
An affective guide robot in a shopping mall
To explore possible robot tasks in daily life, we developed a guide robot for a shopping mall and conducted a field trial with it. The robot was designed to interact naturally wit...
Takayuki Kanda, Masahiro Shiomi, Zenta Miyashita, ...
123
Voted
IDTRUST
2009
ACM
15 years 10 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
139
Voted
IDTRUST
2009
ACM
15 years 10 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...