Sciweavers

1010 search results - page 51 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
GCC
2005
Springer
15 years 5 months ago
A Mathematical Foundation for Topology Awareness of P2P Overlay Networks
Abstract. In peer-to-peer (P2P) overlay networks, the mechanism of a peer randomly joining and leaving a network, causes a topology mismatch between the overlay and the underlying ...
Habib Rostami, Jafar Habibi
ICDCSW
2002
IEEE
15 years 4 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
FOCS
1998
IEEE
15 years 4 months ago
Jitter Control in QoS Networks
We study jitter control in networks with guaranteed quality of service (QoS) from the competitive analysis point of view: we propose on-line algorithms that control jitter and comp...
Yishay Mansour, Boaz Patt-Shamir
UIST
1997
ACM
15 years 4 months ago
Pick-and-Drop: A Direct Manipulation Technique for Multiple Computer Environments
This paper proposes a new field of user interfaces called multi-computer direct manipulation and presents a pen-based direct manipulation technique that can be used for data trans...
Jun Rekimoto
HCW
1999
IEEE
15 years 4 months ago
Are CORBA Services Ready to Support Resource Management Middleware for Heterogeneous Computing?
The goal of this paper is to report our ndings as to which CORBA services are ready to support distributed system software in a heterogeneous environment. In particular, we implem...
Alpay Duman, Debra A. Hensgen, David St. John, Tay...