Sciweavers

2337 search results - page 369 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
SAC
2006
ACM
14 years 3 months ago
Personalization and visualization on handheld devices
The small screen size of handheld mobile devices poses an inherent problem in visualizing data: very often it is too difficult and unpleasant to navigate through the plethora of p...
Dongsong Zhang, George Karabatis, Zhiyuan Chen, Bo...
CHI
2010
ACM
14 years 3 months ago
Biketastic: sensing and mapping for better biking
Bicycling is an affordable, environmentally friendly alternative transportation mode to motorized travel. A common task performed by bikers is to find good routes in an area, whe...
Sasank Reddy, Katie Shilton, Gleb Denisov, Christi...
SACMAT
2009
ACM
14 years 3 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
14 years 3 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
CORR
2010
Springer
119views Education» more  CORR 2010»
13 years 9 months ago
Report on the XBase Project
This project addressed the conceptual fundamentals of data storage, investigating techniques for provision of highly generic storage facilities that can be tailored to produce var...
Evangelos Zirintsis, Graham N. C. Kirby, Alan Dear...