Sciweavers

24529 search results - page 4662 / 4906
» Computing on Authenticated Data
Sort
View
SPAA
2010
ACM
15 years 9 months ago
Implementing and evaluating nested parallel transactions in software transactional memory
Transactional Memory (TM) is a promising technique that simplifies parallel programming for shared-memory applications. To date, most TM systems have been designed to efficientl...
Woongki Baek, Nathan Grasso Bronson, Christos Kozy...
CHI
2009
ACM
15 years 8 months ago
A tag in the hand: supporting semantic, social, and spatial navigation in museums
Designers of mobile, social systems must carefully think about how to help their users manage spatial, semantic, and social modes of navigation. Here, we describe our deployment o...
Dan Cosley, Jonathan Baxter, Soyoung Lee, Brian Al...
EUROPAR
2009
Springer
15 years 8 months ago
SSD-HDD-Hybrid Virtual Disk in Consolidated Environments
Abstract. With the prevalence of multi-core processors and cloud computing, the server consolidation using virtualization has increasingly expanded its territory, and the degree of...
Heeseung Jo, Youngjin Kwon, Hwanju Kim, Euiseong S...
HUC
2009
Springer
15 years 8 months ago
HydroSense: infrastructure-mediated single-point sensing of whole-home water activity
Recent work has examined infrastructure-mediated sensing as a practical, low-cost, and unobtrusive approach to sensing human activity in the physical world. This approach is based...
Jon Froehlich, Eric Larson, Tim Campbell, Conor Ha...
HUC
2009
Springer
15 years 8 months ago
From spaces to places: emerging contexts in mobile privacy
Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary m...
Clara Mancini, Keerthi Thomas, Yvonne Rogers, Blai...
« Prev « First page 4662 / 4906 Last » Next »