Sciweavers

1528 search results - page 147 / 306
» Implementing Generalized Operator Overloading
Sort
View
SP
2006
IEEE
15 years 8 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
MOBICOM
2006
ACM
15 years 8 months ago
Using packet probes for available bandwidth estimation: a wireless testbed experience
Evaluating available bandwidth estimation methods requires a malleable MAC protocol implementation, precise MAC layer packet timing measurements, and the ability to create control...
Mesut Ali Ergin, Marco Gruteser
131
Voted
VRML
2006
ACM
15 years 8 months ago
Function-based shape modeling and visualization in X3D
In this paper, a function-based extension of Extensible 3D (X3D) is proposed. The extension allows authors to use analytical functions to define geometry, color, 3D texture as wel...
Qi Liu, Alexei Sourin
SRDS
2005
IEEE
15 years 8 months ago
A new look at atomic broadcast in the asynchronous crash-recovery model
Atomic broadcast in particular, and group communication in general, have mainly been specified and implemented in a system model where processes do not recover after a crash. The...
Sergio Mena, André Schiper
SIGUCCS
2005
ACM
15 years 7 months ago
Universal imaging: revolutionizing desktop support
Lehigh University has recently implemented a new PC deployment model which is built around the Universal Imaging Utility, a product of Big Bang, LLC. This model has allowed Lehigh...
Stephen G. Lewis, Sara K. Rodgers