Sciweavers

2863 search results - page 506 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
110
Voted
SPAA
2004
ACM
15 years 8 months ago
Pagoda: a dynamic overlay network for routing, data management, and multicasting
The tremendous growth of public interest in peer-to-peer systems in recent years has initiated a lot of research work on how to design efficient and robust overlay networks for t...
Ankur Bhargava, Kishore Kothapalli, Chris Riley, C...
117
Voted
CHI
2008
ACM
16 years 2 months ago
Pointing with fingers, hands and arms for wearable computing
Pointing is a fundamental enabling operation for human-computer interaction across a broad spectrum of scenarios. The paper presents a study exploring how to develop a pointing sy...
Ian Oakley, John Sunwoo, Ilyeon Cho
ICSE
2008
IEEE-ACM
16 years 2 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
DEXA
2004
Springer
131views Database» more  DEXA 2004»
15 years 8 months ago
Partially Ordered Preferences Applied to the Site Location Problem in Urban Planning
Abstract. This paper presents an application that aims at identifying optimal locations based on partially ordered constraints. It combines a tool developed in this project that al...
Sylvain Lagrue, Rodolphe Devillers, Jean-Yves Besq...
123
Voted
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
15 years 7 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...