Sciweavers

3999 search results - page 89 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
CHI
2011
ACM
14 years 8 months ago
Exploring reactive access control
As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access po...
Michelle L. Mazurek, Peter F. Klemperer, Richard S...
SIGMETRICS
2006
ACM
123views Hardware» more  SIGMETRICS 2006»
15 years 10 months ago
Exploiting redundancy to conserve energy in storage systems
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that leverages the redundancy in storage systems to conserve disk energy. Second, it e...
Eduardo Pinheiro, Ricardo Bianchini, Cezary Dubnic...
138
Voted
SIGGRAPH
1997
ACM
15 years 9 months ago
Computer-generated watercolor
This paper describes the various artistic effects of watercolor and shows how they can be simulated automatically. Our watercolor model is based on an ordered set of translucent g...
Cassidy J. Curtis, Sean E. Anderson, Joshua E. Sei...
CCS
2010
ACM
15 years 3 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
SACMAT
2009
ACM
15 years 11 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang