Sciweavers

194 search results - page 27 / 39
» New Technologies Take the Network Home
Sort
View
WWW
2008
ACM
15 years 10 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
WCW
2004
Springer
15 years 3 months ago
Distributed Hashtable on Pre-structured Overlay Networks
Internet overlay services must adapt to the substrate network topology and link properties to achieve high performance. A common overlay structure management layer is desirable fo...
Kai Shen, Yuan Sun
ESORICS
2007
Springer
15 years 3 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu
ICCAD
2007
IEEE
113views Hardware» more  ICCAD 2007»
15 years 6 months ago
Combinational and sequential mapping with priority cuts
An algorithm for technology mapping of combinational and sequential logic networks is proposed and applied to mapping into K-input lookup-tables (K-LUTs). The new algorithm avoids...
Alan Mishchenko, Sungmin Cho, Satrajit Chatterjee,...
WMTE
2005
IEEE
15 years 3 months ago
A Multi-Model Approach for Supporting the Personalization of Ubiquitous Learning Applications
An additional platform for supporting learning in the same physical space in which it takes place, is now available owing to the continuous advancement of wireless and mobile tech...
Rosa G. J. Paredes, Hiroaki Ogata, Yoneo Yano, Ger...