Sciweavers

807 search results - page 94 / 162
» Term Rewriting for Access Control
Sort
View
113
Voted
HPDC
2006
IEEE
15 years 9 months ago
On the Harmfulness of Redundant Batch Requests
Most parallel computing resources are controlled by batch schedulers that place requests for computation in a queue until access to compute nodes is granted. Queue waiting times a...
Henri Casanova
133
Voted
AVI
2006
15 years 4 months ago
Evaluating the effects of fluid interface components on tabletop collaboration
Tabletop displays provide exciting opportunities to support individual and collaborative activities such as planning, organizing, and storyboarding. It has been previously suggest...
Uta Hinrichs, M. Sheelagh T. Carpendale, Stacey D....
187
Voted
ICS
2011
Tsinghua U.
14 years 7 months ago
Page placement in hybrid memory systems
Phase-Change Memory (PCM) technology has received substantial attention recently. Because PCM is byte-addressable and exhibits access times in the nanosecond range, it can be used...
Luiz E. Ramos, Eugene Gorbatov, Ricardo Bianchini
HICSS
2008
IEEE
211views Biometrics» more  HICSS 2008»
15 years 10 months ago
Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks
—In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenti...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
144
Voted
ICC
2007
IEEE
160views Communications» more  ICC 2007»
15 years 9 months ago
Opportunistic Cooperation for Quality of Service Provisionings Over Wireless Relay Networks
Abstract— We propose the QoS-driven opportunistic cooperation schemes for the wireless relay networks. By integrating information theory with the concept of effective capacity, o...
Lin Xie, Xi Zhang