Sciweavers

1444 search results - page 138 / 289
» The end of users
Sort
View
INFOCOM
2012
IEEE
13 years 13 days ago
Firewall fingerprinting
—Firewalls are critical security devices handling all traffic in and out of a network. Firewalls, like other software and hardware network devices, have vulnerabilities, which c...
Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex ...
OSDI
2008
ACM
15 years 10 months ago
Block Mason
The flexibility provided by hardware virtualization allows administrators to rapidly create, destroy, and migrate systems across physical hosts. Unfortunately, the storage systems...
Dutch T. Meyer, Brendan Cully, Jake Wires, Norman ...
IUI
2009
ACM
15 years 6 months ago
End-user programming of mashups with vegemite
Mashups are an increasingly popular way to integrate data from multiple web sites to fit a particular need, but it often requires substantial technical expertise to create them. T...
James Lin, Jeffrey Wong, Jeffrey Nichols, Allen Cy...
ICMCS
2008
IEEE
144views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Enabling access to sound archives through integration, enrichment and retrieval
Many digital sound archives still suffer from tremendous problems concerning access. Materials are often in different formats, with related media in separate collections, and with...
Ivan Damnjanovic, Josh Reiss, Dan Barry
VL
2008
IEEE
149views Visual Languages» more  VL 2008»
15 years 4 months ago
Collaborative end-user development on handheld devices
Web 2.0 has enabled end users to collaborate through their own developed artifacts, moving on from text (e.g., Wikipedia, Blogs) to images (e.g., Flickr) and movies (e.g., YouTube...
Navid Ahmadi, Alexander Repenning, Andri Ioannidou