Sciweavers

2061 search results - page 201 / 413
» Authorization for Metacomputing Applications
Sort
View
IDTRUST
2009
ACM
15 years 11 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
SC
2003
ACM
15 years 10 months ago
Identifying and Exploiting Spatial Regularity in Data Memory References
The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses fo...
Tushar Mohan, Bronis R. de Supinski, Sally A. McKe...
125
Voted
AOSD
2007
ACM
15 years 9 months ago
Aspect-oriented application-level scheduling for J2EE servers
Achieving sufficient execution performance is a challenging goal of software development. Unfortunately, violating performance requirements is often revealed at a late stage of th...
Kenichi Kourai, Hideaki Hibino, Shigeru Chiba
135
Voted
CHI
2008
ACM
16 years 5 months ago
The see-Puck: a platform for exploring human-robot relationships
We present the see-Puck, a round display module that extends an open robot platform, the e-Puck. It holds 148 LEDs (light emitting diodes) to enable the presentation of eye-catchi...
Mattias Jacobsson, Johan Bodin, Lars Erik Holmquis...
CHI
2008
ACM
16 years 5 months ago
From awareness to repartee: sharing location within social groups
This paper investigates emergent practices around `microblogging', changing and sharing status within a social group. We present results from a trial of `Connecto', a ph...
Louise Barkhuus, Barry Brown, Marek Bell, Scott Sh...