Sciweavers

4305 search results - page 573 / 861
» Analysing Protocol Implementations
Sort
View
WWW
2003
ACM
16 years 5 months ago
A Multicast-On-Large-Demand Approach to the Flash Crowd Problem
In this paper we propose a multicast-on-large-demand (MOLD) approach to the flash crowd problem. A MOLD Web server may dynamically open a multicast channel for resources when dete...
Rocky K. C. Chang
VLSID
2002
IEEE
152views VLSI» more  VLSID 2002»
16 years 5 months ago
Verification of an Industrial CC-NUMA Server
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
Rajarshi Mukherjee, Yozo Nakayama, Toshiya Mima
OSDI
2004
ACM
16 years 5 months ago
Secure Untrusted Data Repository (SUNDR)
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server o...
David Mazières, Dennis Shasha, Jinyuan Li, ...
PERCOM
2008
ACM
16 years 4 months ago
Multiagent Place-Based Virtual Communities for Pervasive Computing
This paper proposes a multiagent based virtual community as a new means to support pervasive computing services. We give a conceptual definition of the concept of Place-Based Virt...
Tuan Nguyen, Seng Wai Loke, Torab Torabi, Hongen L...
PERCOM
2007
ACM
16 years 4 months ago
A User Interaction Model for NFC Enabled Applications
Near field communication (NFC) is a short-range wireless protocol that allows users to connect devices and access content and services by simply holding enabled devices near each ...
Yaw Anokwa, Gaetano Borriello, Trevor Pering, Roy ...