Sciweavers

4184 search results - page 114 / 837
» Names of Our Lives
Sort
View
DSN
2009
IEEE
15 years 8 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
KIVS
2009
Springer
15 years 8 months ago
Towards the Design of Unexploitable Construction Mechanisms for Multiple-Tree Based P2P Streaming Systems
Abstract. In peer-to-peer based live streaming systems, a great number of participants have to cooperate to efficiently and reliably distribute a continuous flow of data. Each rec...
Michael Brinkmeier, Mathias Fischer, Sascha Grau, ...
CHIMIT
2009
ACM
15 years 8 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
W4A
2009
ACM
15 years 8 months ago
Virtual teaching in a society of learning
: This article relates a reflexion on the experience of authors as teachers in the E-learning modality of university-level teaching. Presently we live in the peak of the new techno...
António Eduardo Martins, Felipa lopes dos R...
ICASSP
2008
IEEE
15 years 8 months ago
A game theoretic framework for incentive-based peer-to-peer live-streaming social networks
Multimedia social network analysis is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu