Sciweavers

1818 search results - page 194 / 364
» How users use access control
Sort
View
SOSP
2005
ACM
16 years 1 months ago
FS2: dynamic data replication in free disk space for improving disk performance and energy consumption
Disk performance is increasingly limited by its head positioning latencies, i.e., seek time and rotational delay. To reduce the head positioning latencies, we propose a novel tech...
Hai Huang, Wanda Hung, Kang G. Shin
129
Voted
POLICY
2005
Springer
15 years 10 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
141
Voted
IV
2002
IEEE
104views Visualization» more  IV 2002»
15 years 10 months ago
An Environment for Studying the Impact of Spatialising Sonified Graphs on Data Comprehension
We describe AudioCave, an environment for exploring the impact of spatialising sonified graphs on a set of numerical data comprehension tasks. Its design builds on findings regard...
Rameshsharma Ramloll, Stephen A. Brewster
121
Voted
GI
2001
Springer
15 years 9 months ago
Towards a Novel Architecture to Support Universal Location Awareness
—The rapid advances in a wide range of wireless access technologies along with an industry-wide IP-convergence have set up the stage for context-aware computing. The “locationâ...
Amiya Bhattacharya, Abhishek Roy, Sajal K. Das
WPES
2003
ACM
15 years 10 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett