Sciweavers

9503 search results - page 1826 / 1901
» Authenticated System Calls
Sort
View
HUC
2009
Springer
15 years 9 months ago
Encountering SenseCam: personal recording technologies in everyday life
In this paper, we present a study of responses to the idea of being recorded by a ubicomp recording technology called SenseCam. This study focused on real-life situations in two N...
David H. Nguyen, Gabriela Marcu, Gillian R. Hayes,...
ICA3PP
2009
Springer
15 years 9 months ago
Evaluating a Dependable Sharable Atomic Data Service on a Planetary-Scale Network
Abstract. Practical implementations of atomically consistent read/write memory service are important building blocks for higher level applications. This is especially true when dat...
Chryssis Georgiou, Nikolas Hadjiprocopiou, Peter M...
ACISP
2001
Springer
15 years 9 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
CCO
2001
Springer
168views Combinatorics» more  CCO 2001»
15 years 9 months ago
Mathematical Programming Models and Formulations for Deterministic Production Planning Problems
Abstract. We study in this lecture the literature on mixed integer programming models and formulations for a specific problem class, namely deterministic production planning probl...
Yves Pochet
DEXA
2001
Springer
151views Database» more  DEXA 2001»
15 years 9 months ago
Cache Conscious Clustering C3
The two main techniques of improving I/O performance of Object Oriented Database Management Systems(OODBMS) are clustering and buffer replacement. Clustering is the placement of o...
Zhen He, Alonso Marquez
« Prev « First page 1826 / 1901 Last » Next »