Sciweavers

17409 search results - page 3419 / 3482
» The Design and Performance of MedJava
Sort
View
MOBISYS
2010
ACM
15 years 5 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
AAAI
2008
15 years 5 months ago
An Architecture and Formalism for Handling Modular Ontologies
The goal of my ongoing work is to provide an architecture for developing and manipulating modular ontologies in such a way that each ontology module can plug into or unplug from a...
Faezeh Ensan
AVI
2008
15 years 5 months ago
Time2Hide: spatial searches and clutter alleviation for the desktop
The desktop metaphor aimed to create a working environment, which would resemble that of the user's desk. With information abundance this desktop is often cluttered with file...
George Lepouras, Aggelos Papatriantafyllou, Akrivi...
129
Voted
FAST
2008
15 years 5 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
129
Voted
LISA
2007
15 years 5 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
« Prev « First page 3419 / 3482 Last » Next »