Sciweavers

1018 search results - page 128 / 204
» Remote User Authentication Using Public Information
Sort
View
ICDCS
2007
IEEE
14 years 2 months ago
Automated Storage Reclamation Using Temporal Importance Annotations
This work focuses on scenarios that require the storage of large amounts of data. Such systems require the ability to either continuously increase the storage space or reclaim spa...
Surendar Chandra, Ashish Gehani, Xuwen Yu
PET
2009
Springer
14 years 2 months ago
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
Today’s Internet architecture makes no deliberate attempt to provide identity privacy—IP addresses are, for example, often static and the consistent use of a single IP address ...
Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren,...
HPDC
2002
IEEE
14 years 28 days ago
Dynamic Monitoring of High-Performance Distributed Applications
Developers and users of high-performance distributed systems often observe performance problems such as unexpectedly low throughput or high latency. Determining the source of the ...
Dan Gunter, Brian Tierney, Keith R. Jackson, Jason...
CHINZ
2009
ACM
13 years 12 months ago
Ambient environments for emotional physical communication
This paper extends our understanding of existing physical and gestural interfaces and presents a potential design space in affective computing using human movement as a form of em...
Michelle Li, He Jianting
CASCON
2007
63views Education» more  CASCON 2007»
13 years 9 months ago
A search-based approach for dynamically re-packaging downloadable applications
Mechanisms such as Java Web Start enable on-thefly downloading and execution of applications installed on remote servers, without the need for having them installed on the local ...
Thierry Bodhuin, Massimiliano Di Penta, Luigi Troi...