Sciweavers

2335 search results - page 393 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
AIS
2004
Springer
15 years 7 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
WWW
2008
ACM
16 years 2 months ago
The seamless browser: enhancing the speed of web browsing by zooming and preview thumbnails
In this paper, we present a new web browsing system, Seamless Browser, for fast link traversal on a large screen like TV In navigating web, users mainly suffer from cognitive over...
ByungIn Yoo, JongHo Lea, YeunBae Kim
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 8 months ago
Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...
IPPS
2008
IEEE
15 years 8 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
MOBISYS
2008
ACM
16 years 1 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...