Sciweavers

490 search results - page 36 / 98
» Enabling User Control with Personal Identity Management
Sort
View
93
Voted
BMCBI
2006
109views more  BMCBI 2006»
15 years 16 days ago
iHOPerator: user-scripting a personalized bioinformatics Web, starting with the iHOP website
Background: User-scripts are programs stored in Web browsers that can manipulate the content of websites prior to display in the browser. They provide a novel mechanism by which u...
Benjamin M. Good, Edward A. Kawas, Byron Yu-Lin Ku...
73
Voted
CHI
2009
ACM
16 years 1 months ago
Lightweight tagging expands information and activity management practices
Could people use tagging to manage day-to-day work in their personal computing environment? Could tagging be sufficiently generic and lightweight to support diverse ways of workin...
Gerard Oleksik, Max L. Wilson, Craig S. Tashman, E...
OSDI
2004
ACM
16 years 23 days ago
Deploying Safe User-Level Network Services with icTCP
We present icTCP, an "information and control" TCP implementation that exposes key pieces of internal TCP state and allows certain TCP variables to be set in a safe fash...
Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi...
IFIP
2003
Springer
15 years 5 months ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott
93
Voted
JSSPP
2005
Springer
15 years 6 months ago
Co-scheduling with User-Settable Reservations
As grid computing becomes more commonplace, so does the importance of coscheduling these geographically distributed resourcest. Negotiating resource management and scheduling deci...
Kenneth Yoshimoto, Patricia A. Kovatch, Phil Andre...