Sciweavers

5273 search results - page 1003 / 1055
» Secured Web Access
Sort
View
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 7 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
CHI
2009
ACM
16 years 1 months ago
Interacting with eHealth: towards grand challenges for HCI
While health records are increasingly stored electronically, we, as citizens, have little access to this data about ourselves. We are not used to thinking of these official record...
m. c. schraefel, Paul André, Ryen White, De...
HPDC
2012
IEEE
13 years 3 months ago
vSlicer: latency-aware virtual machine scheduling via differentiated-frequency CPU slicing
Recent advances in virtualization technologies have made it feasible to host multiple virtual machines (VMs) in the same physical host and even the same CPU core, with fair share ...
Cong Xu, Sahan Gamage, Pawan N. Rao, Ardalan Kanga...
BTW
2007
Springer
245views Database» more  BTW 2007»
15 years 7 months ago
From Personal Desktops to Personal Dataspaces: A Report on Building the iMeMex Personal Dataspace Management System
Abstract: We propose a new system that is able to handle the entire Personal Dataspace of a user. A Personal Dataspace includes all data pertaining to a user on all his disks and o...
Jens-Peter Dittrich, Lukas Blunschi, Markus Fä...
MOBICOM
2004
ACM
15 years 6 months ago
The changing usage of a mature campus-wide wireless network
Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to und...
Tristan Henderson, David Kotz, Ilya Abyzov
« Prev « First page 1003 / 1055 Last » Next »