Sciweavers

1444 search results - page 219 / 289
» The end of users
Sort
View
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
16 years 1 months ago
How Efficient Can Memory Checking Be?
We consider the problem of memory checking, where a user wants to maintain a large database on a remote server but has only limited local storage. The user wants to use the small ...
Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod V...
93
Voted
CHI
2007
ACM
16 years 1 months ago
Storytelling alice motivates middle school girls to learn computer programming
We describe Storytelling Alice, a programming environment that introduces middle school girls to computer programming as a means to the end of creating 3D animated stories. Storyt...
Caitlin Kelleher, Randy F. Pausch, Sara B. Kiesler
ICC
2007
IEEE
212views Communications» more  ICC 2007»
15 years 7 months ago
Middleware Vertical Handoff Manager: A Neural Network-Based Solution
— – Major research challenges in the next generation of wireless networks include the provisioning of worldwide seamless mobility across heterogeneous wireless networks, the im...
Nidal Nasser, Sghaier Guizani, Eyhab Al-Masri
107
Voted
SIGCOMM
2006
ACM
15 years 6 months ago
Planet scale software updates
Fast and effective distribution of software updates (a.k.a. patches) to millions of Internet users has evolved into a critical task over the last years. In this paper, we characte...
Christos Gkantsidis, Thomas Karagiannis, Milan Voj...
SOUPS
2006
ACM
15 years 6 months ago
Seeing further: extending visualization as a basis for usable security
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...