Sciweavers

2061 search results - page 325 / 413
» Authorization for Metacomputing Applications
Sort
View
100
Voted
EUROSYS
2007
ACM
15 years 9 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
117
Voted
CHI
2010
ACM
15 years 7 months ago
Embodied social proxy: mediating interpersonal connection in hub-and-satellite teams
Current business conditions have given rise to distributed teams that are mostly collocated except for one remote member. These “hub-and-satellite” teams face the challenge of...
Gina Venolia, John C. Tang, Ruy Cervantes, Sara Bl...
72
Voted
CHI
2010
ACM
15 years 7 months ago
LensMouse: augmenting the mouse with an interactive touch display
We introduce LensMouse, a novel device that embeds a touch-screen display – or tangible ‘lens’ – onto a mouse. Users interact with the display of the mouse using direct to...
Xing-Dong Yang, Edward Mak, David C. McCallum, Pou...
147
Voted
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
15 years 7 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
103
Voted
CC
2009
Springer
106views System Software» more  CC 2009»
15 years 7 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...