Sciweavers

2514 search results - page 459 / 503
» Design, Implementation, and Evaluation of a Digital Lectern ...
Sort
View
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 4 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
ICMI
2009
Springer
94views Biometrics» more  ICMI 2009»
15 years 4 months ago
Modeling culturally authentic style shifting with virtual peers
: We report on a new kind of culturally-authentic embodied conversational agent more in line with the ways that culture and ethnicity function in the real world. On the basis of th...
Justine Cassell, Kathleen Geraghty, Berto Gonzalez...
GLOBECOM
2008
IEEE
15 years 4 months ago
Cross-Layer Error Control Optimization in WiMAX
—WiMAX is one of the most promising emerging broadband wireless technologies. As a consequence, data transfer performance optimization represents a crucial issue due to TCP limit...
Dzmitry Kliazovich, Tommaso Beniero, Sergio Dalsas...
ESCIENCE
2007
IEEE
15 years 4 months ago
Aneka: Next-Generation Enterprise Grid Platform for e-Science and e-Business Applications
In this paper, we present the design of Aneka, a .NET based service-oriented platform for desktop grid computing that provides: (i) a configurable service container hosting plugga...
Xingchen Chu, Krishna Nadiminti, Chao Jin, Srikuma...
HPDC
2007
IEEE
15 years 4 months ago
Cooperative secondary authorization recycling
As distributed applications such as Grid and enterprise systems scale up and become increasingly complex, their authorization infrastructures—based predominantly on the request-...
Qiang Wei, Matei Ripeanu, Konstantin Beznosov