Sciweavers

3979 search results - page 34 / 796
» Wild control operators
Sort
View
CHI
2007
ACM
15 years 1 months ago
Longitudinal study of continuous non-speech operated mouse pointer
This paper reports a longitudinal study of a non-speech input-controlled continuous cursor control system: Whistling User Interface (U3I). This study combines quantitative (target...
Adam J. Sporka, Sri Hastuti Kurniawan, Murni Mahmu...
SECON
2010
IEEE
14 years 7 months ago
QoI-Aware Wireless Sensor Network Management for Dynamic Multi-Task Operations
Abstract--This paper considers the novel area of quality-ofinformation (QoI)-aware network management of multitasking wireless sensor networks (WSNs). Specifically, it provides an ...
Chi Harold Liu, Chatschik Bisdikian, Joel W. Branc...
ACSAC
2001
IEEE
15 years 1 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
VLDB
1987
ACM
111views Database» more  VLDB 1987»
15 years 1 months ago
Performance Evaluation of an Operating System Transaction Manager
A conventional transaction manager implemented by a database management system (DBMS) was compared against one implemented within an operating system (OS) in a variety of simulate...
Akhil Kumar, Michael Stonebraker
OSDI
2008
ACM
15 years 10 months ago
Corey: An Operating System for Many Cores
Multiprocessor application performance can be limited by the operating system when the application uses the operating system frequently and the operating system services use data ...
Aleksey Pesterev, Haibo Chen, Lex Stein, M. Frans ...