Sciweavers

1470 search results - page 248 / 294
» DEFACTO: A Design Environment for Adaptive Computing Technol...
Sort
View
99
Voted
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
15 years 3 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
CHI
2003
ACM
15 years 2 months ago
Cell phone communication and driver visual behavior: the impact of cognitive distraction
With the advent of new technology in vehicles, drivers can access information in many different forms (email, address books, Web pages) and from many information sources (cell pho...
Patricia Trbovich, Joanne L. Harbluk
CCGRID
2004
IEEE
15 years 1 months ago
Unifier: unifying cache management and communication buffer management for PVFS over InfiniBand
The advent of networking technologies and high performance transport protocols facilitates the service of storage over networks. However, they pose challenges in integration and i...
Jiesheng Wu, Pete Wyckoff, Dhabaleswar K. Panda, R...
BIOADIT
2006
Springer
15 years 1 months ago
Packet Classification with Evolvable Hardware Hash Functions - An Intrinsic Approach
Bandwidth demands of communication networks are rising permanently. Thus, the requirements to modern routers regarding packet classification are rising accordingly. Conventional al...
Harald Widiger, Ralf Salomon, Dirk Timmermann
74
Voted
WWW
2002
ACM
15 years 10 months ago
Abstracting application-level web security
ing Application-Level Web Security David Scott Laboratory For Communications Engineering Engineering Department Trumpington Street Cambridge CB2 1PZ djs55@eng.cam.ac.uk Richard Sha...
David Scott, Richard Sharp