Sciweavers

661 search results - page 127 / 133
» Distributed and Secure Access Control in P2P Databases
Sort
View
EUROPAR
2009
Springer
15 years 2 months ago
MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualiz...
Anastassios Nanos, Nectarios Koziris
CHI
2005
ACM
15 years 10 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
DRM
2005
Springer
15 years 3 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
EAGC
2003
Springer
15 years 2 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
TOCHI
1998
89views more  TOCHI 1998»
14 years 9 months ago
Using Metalevel Techniques in a Flexible Toolkit for CSCW Applications
Ideally, software toolkits for collaborative applications should provide generic, reusable components, applicable in a wide range of circumstances, which software developers can as...
Paul Dourish