Sciweavers

154 search results - page 18 / 31
» Providing Policy-Neutral and Transparent Access Control in E...
Sort
View
OOPSLA
2001
Springer
13 years 12 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès
SIGMOD
2005
ACM
177views Database» more  SIGMOD 2005»
14 years 7 months ago
An approach for pipelining nested collections in scientific workflows
We describe an approach for pipelining nested data collections in scientific workflows. Our approach logically delimits arbitrarily nested collections of data tokens using special...
Timothy M. McPhillips, Shawn Bowers
FAST
2004
13 years 9 months ago
A Versatile and User-Oriented Versioning File System
File versioning is a useful technique for recording a history of changes. Applications of versioning include backups and disaster recovery, as well as monitoring intruders' a...
Kiran-Kumar Muniswamy-Reddy, Charles P. Wright, An...
CHI
2002
ACM
14 years 8 months ago
A flexible 3d sound system for interactive applications
We have developed a 3D sound system for headphones that allows real-time sound source and user displacement in a virtual acoustic environment. Because of a flexible design that us...
Lalya Gaye
WWW
2008
ACM
14 years 8 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth