Sciweavers

360 search results - page 15 / 72
» The design of integrating subliminal channel with access con...
Sort
View
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 4 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...
113
Voted
TWC
2008
99views more  TWC 2008»
15 years 12 days ago
Cross layer dynamic resource allocation with targeted throughput for WCDMA data
We consider resource allocation for elastic wireless applications that measure utility by target connection average throughput and achieved throughput. We construct a framework for...
Peifang Zhang, Scott Jordan
99
Voted
SACMAT
2009
ACM
15 years 7 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
PERCOM
2006
ACM
16 years 4 days ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
101
Voted
MM
1999
ACM
133views Multimedia» more  MM 1999»
15 years 4 months ago
NoteLook: taking notes in meetings with digital video and ink
NoteLook is a client-server system designed and built to support multimedia note taking in meetings with digital video and ink. It is integrated into a conference room equipped wi...
Patrick Chiu, Ashutosh Kapuskar, Sarah Reitmeier, ...