Sciweavers

2504 search results - page 487 / 501
» Enterprise Security Architecture
Sort
View
SIGOPS
2008
116views more  SIGOPS 2008»
14 years 9 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
CONCURRENCY
2002
152views more  CONCURRENCY 2002»
14 years 9 months ago
The Legion Grid Portal
-- The Legion Grid Portal is an interface to a grid system. Users interact with the portal, and hence a grid through an intuitive interface from which they can view files, submit a...
Anand Natrajan, Anh Nguyen-Tuong, Marty Humphrey, ...
ECRA
2002
180views more  ECRA 2002»
14 years 9 months ago
vCOM: Electronic commerce in a collaborative virtual world
Existing e-commerce applications on the web provide the users a relatively simple, browser-based interface to access available products. Customers are not provided with the same s...
Xiaojun Shen, T. Radakrishnan, Nicolas D. Georgana...
COMGEO
1999
ACM
14 years 9 months ago
Visualizing geometric algorithms over the Web
The visual nature of geometry applications makes them a natural area where visualization can be an effective tool for demonstrating algorithms. In this paper we propose a new mode...
James E. Baker, Isabel F. Cruz, Giuseppe Liotta, R...
TMC
2010
115views more  TMC 2010»
14 years 8 months ago
Controlled Wi-Fi Sharing in Cities: A Decentralized Approach Relying on Indirect Reciprocity
—In densely populated cities, Wi-Fi networks—private or otherwise—are ubiquitous. We focus on the provision of citywide broadband communication capability to mobile users thr...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...