Sciweavers

554 search results - page 58 / 111
» Analysing Requirements for Content Management
Sort
View
PERVASIVE
2009
Springer
15 years 4 months ago
Users' View on Context-Sensitive Car Advertisements
Cars are ubiquitous and offer large and often highly visible surfaces that can be used as advertising space. Until now, advertising in this domain has focused on commercial vehicle...
Florian Alt, Christoph Evers, Albrecht Schmidt
SC
2000
ACM
15 years 4 months ago
MPICH-GQ: Quality-of-Service for Message Passing Programs
Parallel programmers typically assume that all resources required for a program’s execution are dedicated to that purpose. However, in local and wide area networks, contention f...
Alain J. Roy, Ian T. Foster, William Gropp, Nichol...
PLDI
2009
ACM
16 years 16 days ago
Automatic generation of library bindings using static analysis
High-level languages are growing in popularity. However, decades of C software development have produced large libraries of fast, timetested, meritorious code that are impractical...
Tristan Ravitch, Steve Jackson, Eric Aderhold, Ben...
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
ADBIS
2006
Springer
160views Database» more  ADBIS 2006»
15 years 1 months ago
Data Ring: Let Us Turn the Net into a Database!
Because of information ubiquity, one observes an important trend towards transferring information management tasks from database systems to networks. We introduce the notion of Da...
Serge Abiteboul, Neoklis Polyzotis