Sciweavers

1566 search results - page 239 / 314
» Contification Using Dominators
Sort
View
IPCCC
2005
IEEE
15 years 8 months ago
Utilizing characteristics of last link to improve TCP performance
TCP, perhaps the most widely used transport protocol, was designed for wired links and stationary hosts. But more and more links with different characteristics are used to access...
Xiuchao Wu, I. Biswas, Mun Choon Chan, Akkihebbal ...
IV
2005
IEEE
130views Visualization» more  IV 2005»
15 years 8 months ago
A Comparison of Visual and Haptic Object Representations Based on Similarity
Do we judge similarity between two objects to be the same using touch and vision? We investigated this using psychophysical experiments in which subjects rated the similarity betw...
Theresa Cooke, Christian Wallraven, Heinrich H. B&...
120
Voted
SMI
2005
IEEE
15 years 8 months ago
Curvature-based Energy for Simulation and Variational Modeling
Curvature-based energy and forces are used in a broad variety of contexts, ranging from modeling of thin plates and shells to surface fairing and variational surface design. The a...
Denis Zorin
SIGCOMM
2005
ACM
15 years 8 months ago
A case study in building layered DHT applications
Recent research has shown that one can use Distributed Hash Tables (DHTs) to build scalable, robust and efficient applications. One question that is often left unanswered is that ...
Yatin Chawathe, Sriram Ramabhadran, Sylvia Ratnasa...
117
Voted
IFIP
2005
Springer
15 years 7 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan