Sciweavers

2030 search results - page 395 / 406
» The Need for Customizable Operating Systems
Sort
View
AVI
2008
13 years 10 months ago
The in-context slider: a fluid interface component for visualization and adjustment of values while authoring
As information environments grow in complexity, we yearn for simple interfaces that streamline human cognition and effort. Users need to perform complex operations on thousands of...
Andrew Webb, Andruid Kerne
CCS
2008
ACM
13 years 9 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
ASPLOS
2006
ACM
13 years 9 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
PERVASIVE
2010
Springer
13 years 9 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
COLCOM
2007
IEEE
13 years 9 months ago
Using context to assist the adaptation of protected multimedia content in virtual collaboration applications
—This paper proposes a framework for a virtual classroom application based on a Virtual Collaboration System (VCS), which is being developed under the VISNET II Network of Excell...
Maria Teresa Andrade, Hemantha Kodikara Arachchi, ...