Sciweavers

2178 search results - page 330 / 436
» Toward Systemically Secure IT Architectures
Sort
View
EUROSYS
2011
ACM
12 years 11 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
MC
2008
139views Computer Science» more  MC 2008»
13 years 9 months ago
Combining Web 2.0 and Collaboration Support Systems
In the current discussion of the impact Web 2.0 may have on CSCW and Groupware research, Web 2.0 applications are often considered to be a substitute for Collaboration Support Sys...
Michael Prilla, Carsten Ritterskamp
HCI
2009
13 years 5 months ago
High-Fidelity Prototyping of Interactive Systems Can Be Formal Too
The design of safety critical systems calls for advanced software engineering models, methods and tools in order to meet the safety requirements that will avoid putting human life ...
Philippe A. Palanque, Jean-François Ladry, ...
HPCA
2008
IEEE
14 years 8 months ago
System level analysis of fast, per-core DVFS using on-chip switching regulators
Portable, embedded systems place ever-increasing demands on high-performance, low-power microprocessor design. Dynamic voltage and frequency scaling (DVFS) is a well-known techniq...
Wonyoung Kim, Meeta Sharma Gupta, Gu-Yeon Wei, Dav...
ICNS
2007
IEEE
14 years 2 months ago
A Wireless Mesh Network-based System for Hotspots Deployment and Management
— In recent years Wireless Local Area Networks (WLANs) or hotspots, as they are commonly known, have emerged as a promising networking platform to extend network connectivity in ...
Jorge Hortelano, Juan-Carlos Cano, Carlos Miguel T...