Sciweavers

3901 search results - page 717 / 781
» software 2008
Sort
View
MOBISYS
2008
ACM
16 years 4 days ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
125
Voted
MOBISYS
2008
ACM
16 years 4 days ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
91
Voted
EDBTW
2010
Springer
15 years 7 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
112
Voted
CW
2008
IEEE
15 years 7 months ago
Bi-Manual Interactive Tools for Cultural Heritage Researchers
The availability of intuitive, user-friendly and specialized software to work with 3D models of cultural heritage artifacts is as important as the availability of low-cost and rob...
Can Ozmen, Selim Balcisoy
97
Voted
ISCA
2008
IEEE
134views Hardware» more  ISCA 2008»
15 years 7 months ago
Flexible Decoupled Transactional Memory Support
A high-concurrency transactional memory (TM) implementation needs to track concurrent accesses, buffer speculative updates, and manage conflicts. We present a system, FlexTM (FLE...
Arrvindh Shriraman, Sandhya Dwarkadas, Michael L. ...