Sciweavers

24529 search results - page 4642 / 4906
» Computing on Authenticated Data
Sort
View
ISSTA
2006
ACM
15 years 10 months ago
The case for analysis preserving language transformation
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...
IWCMC
2006
ACM
15 years 10 months ago
Performance evaluation of joint downlink scheduling in multi-cellular OFDMA systems based on IEEE 802.16a
The employment of the OFDMA transmission technique in broadband radio systems shows several benefits. Especially the exploitation of multi-user diversity with the help of sophisti...
Michael Einhaus, Ole Klein, Bernhard Walke, Daniel...
JCDL
2006
ACM
159views Education» more  JCDL 2006»
15 years 10 months ago
EcoPod: a mobile tool for community based biodiversity collection building
Biological studies rely heavily on large collections of species observations. All of these collections cannot be compiled by biology professionals alone. Skilled amateurs can assi...
YuanYuan Yu, Jeannie A. Stamberger, Aswath Manohar...
NETGAMES
2006
ACM
15 years 10 months ago
Post-game estimation of game client RTT and hop count distributions
In first person shooter (FPS) games the round trip time (RTT) (delay, or ‘lag’) between a client and server is an important criterion for players when deciding which server to ...
Grenville J. Armitage, Carl Javier, Sebastian Zand...
PPOPP
2006
ACM
15 years 10 months ago
Fast and transparent recovery for continuous availability of cluster-based servers
Recently there has been renewed interest in building reliable servers that support continuous application operation. Besides maintaining system state consistent after a failure, o...
Rosalia Christodoulopoulou, Kaloian Manassiev, Ang...
« Prev « First page 4642 / 4906 Last » Next »