Sciweavers

484 search results - page 70 / 97
» The characteristics of mobile data service users in Australi...
Sort
View
ACSAC
2000
IEEE
14 years 4 days ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
HCI
2009
13 years 5 months ago
Acquiring a Physical World and Serving Its Mirror World Simultaneously
A mirror world, which is a virtual space modeling a physical space, attracts enormous interests from VR community recently. Various applications such as Second Life, Google Earth a...
Sengpyo Hong, Jong-gil Ahn, Heedong Ko, Jinwook Ki...
ICDE
2010
IEEE
246views Database» more  ICDE 2010»
14 years 7 months ago
Admission Control Mechanisms for Continuous Queries in the Cloud
Abstract--Amazon, Google, and IBM now sell cloud computing services. We consider the setting of a for-profit business selling data stream monitoring/management services and we inve...
Alexandros Labrinidis, Christine Chung, Kirk Pruhs...
DANCE
2002
IEEE
14 years 21 days ago
Active Names: Flexible Location and Transport of Wide-Area Resources
In this paper, we explore flexible name resolution as a way of supporting extensibility for wide-area distributed services. Our approach, called Active Names, maps names to a cha...
Amin Vahdat, Michael Dahlin, Thomas E. Anderson, A...
DBSEC
2003
149views Database» more  DBSEC 2003»
13 years 9 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...