Sciweavers

4262 search results - page 165 / 853
» Internet and Intranet Computing
Sort
View
138
Voted
MASCOTS
2003
15 years 5 months ago
Computer Virus Propagation Models
Abstract. The availability of reliable models of computer virus propagation would prove useful in a number of ways, in order both to predict future threats, and to develop new cont...
Giuseppe Serazzi, Stefano Zanero
126
Voted
CCR
2006
117views more  CCR 2006»
15 years 3 months ago
Efficient and decentralized computation of approximate global state
Abstract-- The need for efficient computation of approximate global state lies at the heart of a wide range of problems in distributed systems. Examples include routing in the Inte...
S. Keshav
122
Voted
JPDC
2006
83views more  JPDC 2006»
15 years 3 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit
163
Voted
PERCOM
2004
ACM
16 years 3 months ago
Towards Scalable P2P Computing for Mobile Ad Hoc Networks
In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for t...
Marco Conti, Enrico Gregori, Giovanni Turi
116
Voted
ICALT
2007
IEEE
15 years 10 months ago
Handheld Computer Supported Context-aware learning with 2D Barcodes
This paper reports a study that aims to construct a 2D barcode supported learning system, called HELLO (Handheld English Language Learning Organization), to improve students’ En...
Yu-Ling Chu, Tsung-Yu Liu