Sciweavers

138 search results - page 12 / 28
» Who Owns Your Computer
Sort
View
124
Voted
ACMSE
2007
ACM
15 years 6 months ago
Integrating BlackBerry wireless devices into computer programming and literacy courses
In this paper we describe our experience in integrating the RIM's BlackBerry handheld wireless device into programming and literacy courses at the University of Guelph and th...
Qusay H. Mahmoud, Allan Dyer
116
Voted
DBSEC
2007
104views Database» more  DBSEC 2007»
15 years 4 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng
101
Voted
ICALT
2008
IEEE
15 years 9 months ago
CyberLab: An Online Virtual Laboratory Toolkit for Non-Programmers
Online virtual laboratory is important for online science education. CyberLab is a toolkit for online virtual experiments. It is able to handle the creation, exportation, and exec...
Kang Zhao, Matthew P. Evett
113
Voted
EDBT
2012
ACM
254views Database» more  EDBT 2012»
13 years 5 months ago
Inside "Big Data management": ogres, onions, or parfaits?
In this paper we review the history of systems for managing “Big Data” as well as today’s activities and architectures from the (perhaps biased) perspective of three “data...
Vinayak R. Borkar, Michael J. Carey, Chen Li
164
Voted
ECEASST
2010
14 years 12 months ago
Open Source Verification under a Cloud
Abstract: An experiment in providing volunteer cloud computing support for automated audits of open source code is described here, along with the supporting theory. Certification a...
Peter T. Breuer, Simon Pickin