Sciweavers

13224 search results - page 156 / 2645
» Self-monitoring for Computer Users
Sort
View
APSCC
2006
IEEE
15 years 3 months ago
GHIDS: Defending Computational Grids against Misusing of Shared Resources
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Ju...
EUROPAR
2003
Springer
15 years 7 months ago
Support for Personal and Service Mobility in Ubiquitous Computing Environments
This paper describes an agent-based architecture that extends personal mobility to ubiquitous environment. A software agent, running on a portable device, leverages the existing se...
Khalil El-Khatib, N. Hadibi, Gregor von Bochmann
CRYPTO
1999
Springer
109views Cryptology» more  CRYPTO 1999»
15 years 6 months ago
Coding Constructions for Blacklisting Problems without Computational Assumptions
Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2n users so that all but some specified coalition of k excl...
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai
ICAD
2004
15 years 3 months ago
A Generic, Semantically-Based Design Approach for Spatial Auditory Computer Displays
This paper describes a design approach for creating generic computer user interfaces with spatial auditory displays. It proposes a structured depiction process from formulating mo...
Christopher Frauenberger, Robert Höldrich, Al...
CHI
2006
ACM
16 years 2 months ago
Share and share alike: exploring the user interface affordances of file sharing
With the rapid growth of personal computer networks and the Internet, sharing files has become a central activity in computer use. The ways in which users control the what, how, a...
Stephen Voida, W. Keith Edwards, Mark W. Newman, R...