Sciweavers

488 search results - page 3 / 98
» REDUCE Meets CAMAL
Sort
View
ACSAC
2000
IEEE
13 years 10 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
INFOCOM
2010
IEEE
13 years 4 months ago
When Watchdog Meets Coding
Abstract—In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium...
Guanfeng Liang, Rachit Agarwal, Nitin Vaidya
CLOUDCOM
2010
Springer
13 years 2 months ago
Scheduling Hadoop Jobs to Meet Deadlines
User constraints such as deadlines are important requirements that are not considered by existing cloud-based data processing environments such as Hadoop. In the current implementa...
Kamal Kc, Kemafor Anyanwu
CSCW
2012
ACM
12 years 1 months ago
Markup as you talk: establishing effective memory cues while still contributing to a meeting
Meeting participants can experience cognitive overload when they need both to verbally contribute to ongoing discussion while simultaneously creating notes to promote later recall...
Steve Whittaker, Vaiva Kalnikaité, Patrick ...
PVLDB
2010
158views more  PVLDB 2010»
13 years 4 months ago
MEET DB2: Automated Database Migration Evaluation
Commercial databases compete for market share, which is composed of not only net-new sales to those purchasing a database for the first time, but also competitive “win-backs”...
Reynold Xin, Patrick Dantressangle, Sam Lightstone...