Sciweavers

9325 search results - page 1742 / 1865
» The decentralized implementability problem
Sort
View
136
Voted
SIGUCCS
2005
ACM
15 years 9 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
124
Voted
SOUPS
2005
ACM
15 years 9 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
VEE
2005
ACM
150views Virtualization» more  VEE 2005»
15 years 9 months ago
Diagnosing performance overheads in the xen virtual machine environment
Virtual Machine (VM) environments (e.g., VMware and Xen) are experiencing a resurgence of interest for diverse uses including server consolidation and shared hosting. An applicati...
Aravind Menon, Jose Renato Santos, Yoshio Turner, ...
133
Voted
WIKIS
2005
ACM
15 years 9 months ago
qwikWeb: integrating mailing list and WikiWikiWeb for group communication
We have developed a new powerful group communication system qwikWeb, which is an integration of a WikiWikiWeb (wiki) and a mailing list system. Mailing lists are useful for exchan...
Kouichirou Eto, Satoru Takabayashi, Toshiyuki Masu...
157
Voted
WMASH
2005
ACM
15 years 9 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
« Prev « First page 1742 / 1865 Last » Next »