Sciweavers

2187 search results - page 398 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
IUI
2009
ACM
14 years 4 months ago
Detecting and correcting user activity switches: algorithms and interfaces
The TaskTracer system allows knowledge workers to define a set of activities that characterize their desktop work. It then associates with each user-defined activity the set of ...
Jianqiang Shen, Jed Irvine, Xinlong Bao, Michael G...
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
12 years 3 months ago
Facilitating inter-application interactions for OS-level virtualization
OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However...
Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh, Xiao...
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 9 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
SAC
2006
ACM
14 years 1 months ago
STRUDEL: supporting trust in the dynamic establishment of peering coalitions
The Coalition Peering Domain (CPD) is a recent innovation within the field of mesh networking. It facilitates the management of community-area networks in a distributed and scala...
Daniele Quercia, Manish Lad, Stephen Hailes, Licia...
EWSN
2004
Springer
14 years 7 months ago
Prototyping Wireless Sensor Network Applications with BTnodes
We present a hardware and software platform for rapid prototyping of augmented sensor network systems, which may be temporarily connected to a backend infrastructure for data stora...
Frank Siegemund, Friedemann Mattern, Jan Beutel, K...