Sciweavers

8080 search results - page 1525 / 1616
» From Computer Networks to Agent Networks
Sort
View
123
Voted
FOCS
2007
IEEE
15 years 10 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
153
Voted
MIDDLEWARE
2004
Springer
15 years 9 months ago
Architecture for resource allocation services supporting interactive remote desktop sessions in utility grids
Emerging large scale utility computing systems like Grids promise computing and storage to be provided to end users as a utility. System management services deployed in the middle...
Vanish Talwar, Bikash Agarwalla, Sujoy Basu, Raj K...
147
Voted
C5
2004
IEEE
15 years 7 months ago
Scratch: A Sneak Preview
information technologies as "the ability to reformulate knowledge, to express oneself creatively and appropriately, and to produce and generate information (rather than simply...
John Maloney, Leo Burd, Yasmin B. Kafai, Natalie R...
143
Voted
SIGGRAPH
1998
ACM
15 years 7 months ago
The Office of the Future: A Unified Approach to Image-based Modeling and Spatially Immersive Displays
We introduce ideas, proposed technologies, and initial results for an office of the future that is based on a unified application of computer vision and computer graphics in a sys...
Ramesh Raskar, Greg Welch, Matt Cutts, Adam Lake, ...
151
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
The Curriculum Reform of Database System Principle Based on Paperless Examination Platform
—Database technology is the significant part of computer science and technology, as the core technology of information management, database technology is widely used in the field...
Haifeng Ke, Gaoyan Zhang, Minghui Wu
« Prev « First page 1525 / 1616 Last » Next »