Sciweavers

2399 search results - page 322 / 480
» Knowledge Management and the Design of Distributed Cognition...
Sort
View
CCS
2010
ACM
14 years 9 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
HT
2004
ACM
15 years 3 months ago
When open hypermedia meets peer-to-peer computing
We describe the extension to our previous work on a Web-based peer-to-peer open hypermedia system, the DDLS. We enrich the peer model by introducing query history, and propose the...
Jing Zhou, Wendy Hall, David De Roure
SRDS
2000
IEEE
15 years 2 months ago
Semantically Reliable Multicast Protocols
Reliable multicast protocols can strongly simplify the design of distributed applications. However, it is hard to sustain a high multicast throughput when groups are large and het...
José Orlando Pereira, Rui Carlos Oliveira, ...
99
Voted
CLUSTER
2004
IEEE
14 years 10 months ago
Configurable Network Processing for Mobile Agents on the Internet
This paper presents a framework for building and deploying protocols for migrating mobile agents over the Internet. The framework enables network protocols for agent migration to b...
Ichiro Satoh
IRCDL
2010
14 years 11 months ago
Interactive Visual Representations of Complex Information Structures
One of the most challenging issues in managing the large and diverse data available on the World Wide Web is the design of interactive systems to organize and represent information...
Gianpaolo D'Amico, Alberto Del Bimbo, Marco Meoni