Sciweavers

1018 search results - page 128 / 204
» Remote User Authentication Using Public Information
Sort
View
ICDCS
2007
IEEE
15 years 8 months ago
Automated Storage Reclamation Using Temporal Importance Annotations
This work focuses on scenarios that require the storage of large amounts of data. Such systems require the ability to either continuously increase the storage space or reclaim spa...
Surendar Chandra, Ashish Gehani, Xuwen Yu
90
Voted
PET
2009
Springer
15 years 8 months ago
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
Today’s Internet architecture makes no deliberate attempt to provide identity privacy—IP addresses are, for example, often static and the consistent use of a single IP address ...
Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren,...
HPDC
2002
IEEE
15 years 7 months ago
Dynamic Monitoring of High-Performance Distributed Applications
Developers and users of high-performance distributed systems often observe performance problems such as unexpectedly low throughput or high latency. Determining the source of the ...
Dan Gunter, Brian Tierney, Keith R. Jackson, Jason...
CHINZ
2009
ACM
15 years 6 months ago
Ambient environments for emotional physical communication
This paper extends our understanding of existing physical and gestural interfaces and presents a potential design space in affective computing using human movement as a form of em...
Michelle Li, He Jianting
97
Voted
CASCON
2007
63views Education» more  CASCON 2007»
15 years 3 months ago
A search-based approach for dynamically re-packaging downloadable applications
Mechanisms such as Java Web Start enable on-thefly downloading and execution of applications installed on remote servers, without the need for having them installed on the local ...
Thierry Bodhuin, Massimiliano Di Penta, Luigi Troi...