Sciweavers

151 search results - page 14 / 31
» Unifying File System Protection
Sort
View
WISEC
2010
ACM
13 years 11 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
14 years 11 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...
ICDCS
2008
IEEE
14 years 5 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
JCIT
2010
139views more  JCIT 2010»
13 years 5 months ago
Constructing Product Knowledge-Sharing System for Internet Transaction-Matching Model
This study explores the construction of an intermediary as a product knowledge-sharing system for design industry with the advanced features of the Extensible Markup Language (XML...
Yu-Cheng Chen, Hsin-Hsi Lai, Heng-Chang Lin
FDL
2007
IEEE
14 years 5 months ago
Automatic High Level Assertion Generation and Synthesis for Embedded System Design
SystemVerilog encapsulates both design description and verification properties in one language and provides a unified environment for engineers who have the formidable challenge o...
Lun Li, Frank P. Coyle, Mitchell A. Thornton