Sciweavers

12438 search results - page 2248 / 2488
» The Magic of a Number System
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 8 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
VR
2000
IEEE
101views Virtual Reality» more  VR 2000»
15 years 8 months ago
Multimodal Menu Presentation and Selection in Immersive Virtual Environments
Usability has become one of the key ingredients in making virtual reality (VR) systems work, and a big part of a usable VR system is in the design of effective interface/interacti...
Namgyu Kim, Gerard Jounghyun Kim, Chan-Mo Park, In...
ASPLOS
2000
ACM
15 years 8 months ago
Architecture and design of AlphaServer GS320
This paper describes the architecture and implementation of the AlphaServer GS320, a cache-coherent non-uniform memory access multiprocessor developed at Compaq. The AlphaServer G...
Kourosh Gharachorloo, Madhu Sharma, Simon Steely, ...
SIGUCCS
2000
ACM
15 years 8 months ago
Three Years in the Solution Center
After thirty-plus years of making small “mid-course corrections” types of changes to the support paradigm, many on the Iowa State University campus thought it was time to make...
Frank Poduska
SIGUCCS
2000
ACM
15 years 8 months ago
Implementing LIES (Location Independent Email Service)
This paper will provide a useful guide to those schools that have not yet implemented IMAP and are considering doing so. With both the systems and user services perspectives, any ...
Pamela Vogel, John Spadaro
« Prev « First page 2248 / 2488 Last » Next »