Sciweavers

490 search results - page 90 / 98
» Enabling User Control with Personal Identity Management
Sort
View
100
Voted
MOBISYS
2004
ACM
16 years 19 min ago
Mimic: Raw Activity Shipping for File Synchronization in Mobile File Systems
In this paper, we consider the problem of file synchronization when a mobile host shares files with a backbone file server in a network file system. Several diff schemes have been...
Tae-Young Chang, Aravind Velayutham, Raghupathy Si...
121
Voted
SIGMOD
2010
ACM
145views Database» more  SIGMOD 2010»
14 years 10 months ago
How to ConQueR why-not questions
One useful feature that is missing from today’s database systems is an explain capability that enables users to seek clarifications on unexpected query results. There are two t...
Quoc Trung Tran, Chee-Yong Chan
IASTEDSE
2004
15 years 1 months ago
A symbolic Java virtual machine for test case generation
Quality management is becoming a more and more important part of the software development process. As software testing is currently understood as the core function of the quality ...
Roger A. Müller, Christoph Lembeck, Herbert K...
CCS
2006
ACM
15 years 4 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
MM
2003
ACM
145views Multimedia» more  MM 2003»
15 years 5 months ago
Proscenium: a framework for spatio-temporal video editing
We present an approach to video editing where movie sequences are treated as spatio-temporal volumes that can be sheered and warped under user control. This simple capability enab...
Eric P. Bennett, Leonard McMillan