Sciweavers

1040 search results - page 73 / 208
» Resource Usage Verification
Sort
View
118
Voted
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
15 years 9 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
90
Voted
SIGCPR
2006
ACM
166views Hardware» more  SIGCPR 2006»
15 years 8 months ago
Podcasting in academia: a new knowledge management paradigm within academic settings
Podcasting represents a new and exciting learning paradigm within an academic setting. Materials such conference reports, research manuscripts, and course lectures can be recorded...
Peter Ractham, Xuesong Zhang
114
Voted
ARCS
2005
Springer
15 years 8 months ago
Reducing System Level Power Consumption for Mobile and Embedded Platforms
The power consumption of peripheral devices is a significant portion of the overall energy usage of a mobile platform. To take advantage of idle times, most devices offer the abi...
Ripal Nathuji, Karsten Schwan
101
Voted
CASCON
2007
63views Education» more  CASCON 2007»
15 years 4 months ago
A search-based approach for dynamically re-packaging downloadable applications
Mechanisms such as Java Web Start enable on-thefly downloading and execution of applications installed on remote servers, without the need for having them installed on the local ...
Thierry Bodhuin, Massimiliano Di Penta, Luigi Troi...
108
Voted
CN
2004
86views more  CN 2004»
15 years 2 months ago
Management of abusive and unfair Internet access by quota-based priority control
In a free of charge or flat-rate Internet access environment, there often exists abusive and unfair usage of network resources. In this paper, the Internet access by the dormitory...
Tsung-Ching Lin, Yeali S. Sun, Shi-Chung Chang, Sh...