Sciweavers

807 search results - page 141 / 162
» Deploying and evaluating a location-aware system
Sort
View
IMC
2007
ACM
14 years 11 months ago
A global view of kad
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
IM
2003
14 years 11 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...
73
Voted
IAJIT
2007
90views more  IAJIT 2007»
14 years 9 months ago
Software Reuse for Mobile Robot Applications Through Analysis Patterns
: Software analysis pattern is an approach of software reuse which provides a way to reuse expertise that can be used across domains at early level of development. Developing softw...
Dayang N. A. Jawawi, Safaai Deris, Rosbi Mamat
TPDS
2010
116views more  TPDS 2010»
14 years 8 months ago
FS2You: Peer-Assisted Semipersistent Online Hosting at a Large Scale
—It has been widely acknowledged that online file hosting systems within the “cloud” of the Internet have provided valuable services to end users who wish to share files of a...
Fangming Liu, Ye Sun, Bo Li, Baochun Li, Xinyan Zh...
OZCHI
2006
ACM
15 years 3 months ago
AuraOrb: using social awareness cues in the design of progressive notification appliances
One of the problems with notification appliances is that they can be distracting when providing information not of immediate interest to the user. In this paper, we present AuraOr...
Mark Altosaar, Roel Vertegaal, Changuk Sohn, Danie...