Sciweavers

1080 search results - page 187 / 216
» Distributed Hash Tables
Sort
View
107
Voted
CHI
2004
ACM
16 years 3 months ago
Finger talk: collaborative decision-making using talk and fingertip interaction around a tabletop display
We describe a study that investigated how a shared interactive tabletop (DiamondTouch) can be designed to provide new opportunities for supporting collaborative decision-making. S...
Yvonne Rogers, William R. Hazlewood, Eli Blevis, Y...
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
16 years 2 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
105
Voted
CHI
2010
ACM
15 years 9 months ago
ManyNets: an interface for multiple network analysis and visualization
Traditional network analysis tools support analysts in studying a single network. ManyNets offers these analysts a powerful new approach that enables them to work on multiple netw...
Manuel Freire, Catherine Plaisant, Ben Shneiderman...
141
Voted
MOBIHOC
2009
ACM
15 years 9 months ago
Routing in multi-hop wireless mesh networks with bandwidth guarantees
Wireless Mesh Networks (WMNs) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we d...
Ronghui Hou, King-Shan Lui, Hon Sun Chiu, Kwan L. ...
113
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
Scalable Routing Via Greedy Embedding
Abstract—We investigate the construction of greedy embeddings in polylogarithmic dimensional Euclidian spaces in order to achieve scalable routing through geographic routing. We ...
Cédric Westphal, Guanhong Pei