Sciweavers

6187 search results - page 1053 / 1238
» Practical Software Measurement
Sort
View
MSWIM
2006
ACM
15 years 9 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
NETGAMES
2006
ACM
15 years 9 months ago
Plug-replaceable consistency maintenance for multiplayer games
Consistency maintenance of replicated data in multiplayer games is a challenging issue due to the performance constraints of real-time interactive applications. We present an appr...
Robert D. S. Fletcher, T. C. Nicholas Graham, Chri...
SAC
2006
ACM
15 years 9 months ago
Detecting identifiable areas in mobile environments
Location-based applications and services are getting increasingly important for mobile users. They take into account a mobile user's current location and provide a location-d...
Jörg Roth
SIGCOMM
2006
ACM
15 years 9 months ago
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides ...
Andy C. Bavier, Nick Feamster, Mark Huang, Larry L...
SIGIR
2006
ACM
15 years 9 months ago
Formal models for expert finding in enterprise corpora
Searching an organization’s document repositories for experts provides a cost effective solution for the task of expert finding. We present two general strategies to expert se...
Krisztian Balog, Leif Azzopardi, Maarten de Rijke
« Prev « First page 1053 / 1238 Last » Next »