Sciweavers

832 search results - page 130 / 167
» Effect of Malicious Synchronization
Sort
View
CHI
2007
ACM
16 years 6 days ago
Design and evaluation of 3d models for electronic dental records
We present the results of a field study of some of the work practices and software used by dentists. We also present the design, implementation, and evaluation of a user interface...
Michael F. Marotta, Purin Phanichphant, Patrick Ma...
PERCOM
2003
ACM
15 years 11 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
MOBIHOC
2005
ACM
15 years 11 months ago
Timed grid routing (TIGR) bites off energy
Energy efficiency and collisions avoidance are both critical properties to increase the lifetime and effectiveness of wireless networks. This paper proposes a family of algorithms...
Roy Friedman, Guy Korland
ICDCS
2009
IEEE
15 years 9 months ago
Implementing a Register in a Dynamic Distributed System
Providing distributed processes with concurrent objects is a fundamental service that has to be offered by any distributed system. The classical shared read/write register is one ...
Roberto Baldoni, Silvia Bonomi, Anne-Marie Kermarr...
EUROSYS
2009
ACM
15 years 9 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...