Sciweavers

3452 search results - page 78 / 691
» Secure Data Outsourcing
Sort
View
ICWE
2009
Springer
14 years 4 months ago
Tagging-Aware Portlets
A corporate portal supports a community of users on cohesively managing a shared set of resources. Such management should also include social tagging, i.e. the practice of collabor...
Oscar Díaz, Sandy Pérez, Crist&oacut...
ESA
2010
Springer
170views Algorithms» more  ESA 2010»
13 years 11 months ago
Streaming Graph Computations with a Helpful Advisor
Motivated by the trend to outsource work to commercial cloud computing services, we consider a variation of the streaming paradigm where a streaming algorithm can be assisted by a...
Graham Cormode, Michael Mitzenmacher, Justin Thale...
WEBI
2010
Springer
13 years 7 months ago
Exploiting Puzzle Diversity in Puzzle Selection for ESP-Like GWAP Systems
The ESP game belongs to the genre called Games with a Purpose (GWAP), which leverage people's desire to be entertained and also outsource certain steps of the computational p...
Yu-Song Syu, Hsiao-Hsuan Yu, Ling-Jyh Chen
EUROMICRO
2011
IEEE
12 years 9 months ago
Software Product Quality in Global Software Development: Finding Groups with Aligned Goals
— The development of a software product in an organization involves various groups of stakeholders who may prioritize the qualities of the product differently. This paper present...
Panagiota Chatzipetrou, Lefteris Angelis, Sebastia...
ACSAC
2007
IEEE
14 years 4 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo