Sciweavers

551 search results - page 58 / 111
» Preventing existence
Sort
View
DAC
2006
ACM
15 years 5 months ago
High-performance operating system controlled memory compression
This article describes a new software-based on-line memory compression algorithm for embedded systems and presents a method of adaptively managing the uncompressed and compressed ...
Lei Yang, Haris Lekatsas, Robert P. Dick
CIG
2005
IEEE
15 years 5 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
15 years 5 months ago
Challenges of Adopting Web Services: Experiences from the Financial Industry
Despite the many expected benefits of Web services technology, some organizations are hesitating to adopt Web services on a larger scale and across their organizational boundaries...
Andrew P. Ciganek, Marc N. Haines, William (Dave) ...
ICNP
2005
IEEE
15 years 5 months ago
Exploiting Dynamic Querying like Flooding Techniques in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, controlled flooding aims at locating an item at the minimum message cost. Dynamic querying is a new controlled flooding technique. While i...
Hongbo Jiang, Shudong Jin
WORDS
2005
IEEE
15 years 5 months ago
Enhancing DNS Security using the SSL Trust Infrastructure
The main functionality of the Domain Name System (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, ...
Christof Fetzer, Gert Pfeifer, Trevor Jim