Sciweavers

11580 search results - page 2051 / 2316
» Communication vs. Computation
Sort
View
SIGCSE
2008
ACM
93views Education» more  SIGCSE 2008»
15 years 4 months ago
Struggles of new college graduates in their first software development job
How do new college graduates experience their first software development jobs? In what ways are they prepared by their educational experiences, and in what ways do they struggle t...
Andrew Begel, Beth Simon
SIGMETRICS
2008
ACM
131views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
On the design of hybrid peer-to-peer systems
In this paper, we consider hybrid peer-to-peer systems where users form an unstructured peer-to-peer network with the purpose of assisting a server in the distribution of data. We...
Stratis Ioannidis, Peter Marbach
SIGOPS
2008
104views more  SIGOPS 2008»
15 years 4 months ago
PipesFS: fast Linux I/O in the unix tradition
This paper presents PipesFS, an I/O architecture for Linux 2.6 that increases I/O throughput and adds support for heterogeneous parallel processors by (1) collapsing many I/O inte...
Willem de Bruijn, Herbert Bos
IJNSEC
2007
161views more  IJNSEC 2007»
15 years 4 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
IJNSEC
2007
126views more  IJNSEC 2007»
15 years 4 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
« Prev « First page 2051 / 2316 Last » Next »