Sciweavers

3712 search results - page 499 / 743
» Role-Based Access Control
Sort
View
CHI
2005
ACM
16 years 5 months ago
The vacuum: facilitating the manipulation of distant objects
We present the design and evaluation of the vacuum, a new interaction technique that enables quick access to items on areas of a large display that are difficult for a user to rea...
Anastasia Bezerianos, Ravin Balakrishnan
HPCA
2005
IEEE
16 years 5 months ago
Distributing the Frontend for Temperature Reduction
Due to increasing power densities, both on-chip average and peak temperatures are fast becoming a serious bottleneck in processor design. This is due to the cost of removing the h...
Antonio González, Grigorios Magklis, Jos&ea...
SOSP
2003
ACM
16 years 1 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
IEEEARES
2010
IEEE
15 years 11 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
PERCOM
2009
ACM
15 years 11 months ago
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks
— Future application areas of wireless sensor networks (WSNs) may include industrial process automation, aircraft control systems or patient monitoring in hospitals. Such applica...
Petcharat Suriyachai, Utz Roedig, Andrew Scott