Sciweavers

3206 search results - page 508 / 642
» How minds can be computational systems
Sort
View
P2P
2007
IEEE
15 years 4 months ago
PEPINO: PEer-to-Peer network INspectOr
PEPINO is a simple and effective peer-to-peer network inspector. It visualises not only meaningful pointers and connections between peers, but also the exchange of messages betwee...
Donatien Grolaux, Boris Mejías, Peter Van R...
EUROPAR
2007
Springer
15 years 4 months ago
Getting 10 Gb/s from Xen: Safe and Fast Device Access from Unprivileged Domains
The networking performance available to Virtual Machines (VMs) can be low due to the inefficiencies of transferring network packets between the host domain and guests. This can lim...
Kieran Mansley, Greg Law, David Riddoch, Guido Bar...
ACOM
2006
Springer
15 years 4 months ago
Flexible Conversations Using Social Commitments and a Performatives Hierarchy
In this research, we re-arrange FIPA’s ACL performatives to form a subsumption lattice (ontology) and apply a theory of social commitments to achieve a simplified and observable...
Robert C. Kremer, Roberto A. Flores
SIGCSE
2006
ACM
139views Education» more  SIGCSE 2006»
15 years 4 months ago
Closing the loop on test creation: a question assessment mechanism for instructors
New accreditation requirements focus on education as a “continuous improvement process.” The most important part of such a process is that information gets fed back into the s...
Titus Winters, Tom Payne
ESORICS
2004
Springer
15 years 3 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...