Sciweavers

8655 search results - page 1254 / 1731
» Challenges for Trusted Computing
Sort
View
111
Voted
ICSE
2010
IEEE-ACM
15 years 6 months ago
Quality of service profiling
Many computations exhibit a trade off between execution time and quality of service. A video encoder, for example, can often encode frames more quickly if it is given the freedom ...
Sasa Misailovic, Stelios Sidiroglou, Henry Hoffman...
NSDI
2004
15 years 6 months ago
TimeLine: A High Performance Archive for a Distributed Object Store
This paper describes TimeLine, an efficient archive service for a distributed storage system. TimeLine allows users to take snapshots on demand. The archive is stored online so th...
Chuang-Hue Moh, Barbara Liskov
ACMDIS
2010
ACM
15 years 4 months ago
A tale of two publics: democratizing design at the margins
The design and use of Information and Communication Technology (ICT) has now evolved beyond its workplace origins to the wider public, expanding to people who live at the margins ...
Christopher A. Le Dantec, Jim Christensen, Mark Ba...
BMCBI
2007
142views more  BMCBI 2007»
15 years 4 months ago
SABERTOOTH: protein structural alignment based on a vectorial structure representation
Background: The task of computing highly accurate structural alignments of proteins in very short computation time is still challenging. This is partly due to the complexity of pr...
Florian Teichert, Ugo Bastolla, Markus Porto
IEEESP
2007
98views more  IEEESP 2007»
15 years 4 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
« Prev « First page 1254 / 1731 Last » Next »