Sciweavers

7379 search results - page 1072 / 1476
» How Many Clusters
Sort
View
NDSS
2003
IEEE
15 years 10 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
RTAS
2003
IEEE
15 years 10 months ago
Real-Time Support for Mobile Robotics
Coordinated behavior of mobile robots is an important emerging application area. Different coordinated behaviors can be achieved by assigning sets of control tasks, or strategies,...
Huan Li, John Sweeney, Krithi Ramamritham, Roderic...
149
Voted
SRDS
2003
IEEE
15 years 10 months ago
Performance and Effectiveness Analysis of Checkpointing in Mobile Environments
Many mathematical models have been proposed to evaluate the execution performance of an application with and without checkpointing in the presence of failures. They assume that th...
Xinyu Chen, Michael R. Lyu
149
Voted
SRDS
2003
IEEE
15 years 10 months ago
Component Replication in Distributed Systems: A Case Study Using Enterprise Java Beans
A recent trend has seen the extension of objectoriented middleware to component-oriented middleware. A major advantage components offer over objects is that only the business logi...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
VISUALIZATION
2003
IEEE
15 years 10 months ago
Mental Registration of 2D and 3D Visualizations (An Empirical Study)
2D and 3D views are used together in many visualization domains, such as medical imaging, flow visualization, oceanographic visualization, and computer aided design (CAD).Combinin...
Melanie Tory
« Prev « First page 1072 / 1476 Last » Next »