Sciweavers

561 search results - page 48 / 113
» How to operate a PC without using the hands
Sort
View
TRUST
2010
Springer
15 years 6 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
ISPAN
2000
IEEE
15 years 5 months ago
User Level Communication on Alpha Linux Systems
Recent advances in commodity network interface technology enable scientists and engineers to build clusters of workstations or PCs to execute parallel applications. However, raw-h...
Jie Chen, William A. Watson III
USENIX
2008
15 years 3 months ago
Improving Scalability and Fault Tolerance in an Application Management Infrastructure
This paper explores the challenges associated with distributed application management in large-scale computing environments. In particular, we investigate several techniques for e...
Nikolay Topilski, Jeannie R. Albrecht, Amin Vahdat
UIST
1997
ACM
15 years 5 months ago
Usability Analysis of 3D Rotation Techniques
We report results from a formal user study of interactive 3D rotation using the mouse-driven Virtual Sphere and Arcball techniques, as well as multidimensional input techniques ba...
Ken Hinckley, Joe Tullio, Randy F. Pausch, Dennis ...
CCS
2006
ACM
15 years 5 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia