Sciweavers

1818 search results - page 254 / 364
» How users use access control
Sort
View
TRIDENTCOM
2005
IEEE
15 years 9 months ago
A Global X-Bone for Network Experiments
A global Internet overlay testbed is being deployed to support the distributed, shared use of resources for network research. The Global X-Bone (GX-Bone) augments the X-Bone softw...
Joseph D. Touch, Yu-Shun Wang, Venkata K. Pingali,...
ACMACE
2005
ACM
15 years 9 months ago
SymBall: camera driven table tennis for mobile phones
We present a table tennis game concept, implemented for Symbian OS/Series 60 mobile phones, using the phone's integrated camera as the main game controller. The game demonstr...
Mika Hakkarainen, Charles Woodward
CHI
2009
ACM
16 years 4 months ago
Designable visual markers
Visual markers are graphic symbols designed to be easily recognised by machines. They are traditionally used to track goods, but there is increasing interest in their application ...
Enrico Costanza, Jeffrey Huang
HPDC
2005
IEEE
15 years 10 months ago
Increasing application performance in virtual environments through run-time inference and adaptation
Virtual machine distributed computing greatly simplifies the use of widespread computing resources by lowering the abstraction, benefiting both resource providers and users. Tow...
Ananth I. Sundararaj, Ashish Gupta, Peter A. Dinda
NAR
2006
83views more  NAR 2006»
15 years 4 months ago
KOBAS server: a web-based platform for automated annotation and pathway identification
There is an increasing need to automatically annotate a set of genes or proteins (from genome sequencing, DNA microarray analysis or protein 2D gel experiments) using controlled v...
Jianmin Wu, Xizeng Mao, Tao Cai, Jingchu Luo, Lipi...