Sciweavers

9124 search results - page 1750 / 1825
» Requirements-Based Design Evaluation
Sort
View
83
Voted
EDBT
2000
ACM
15 years 2 months ago
Persistent Client-Server Database Sessions
Database systems support recovery, providing high database availability. However, database applications may lose work because of a server failure. In particular, if a database serv...
Roger S. Barga, David B. Lomet, Thomas Baby, Sanja...
SIGGRAPH
1999
ACM
15 years 2 months ago
Creating a Live Broadcast from a Virtual Environment
“Inhabited Television” combines multiuser virtual environments with television, so that online audience-members can participate in TV shows staged in a virtual world. It is pr...
Chris Greenhalgh, John Bowers, Graham Walker, John...
ICPP
1999
IEEE
15 years 2 months ago
A Bandwidth-Efficient Implementation of Mesh with Multiple Broadcasting
This paper presents a mesh with virtual buses as the bandwidth-efficient implementation of the mesh with multiple broadcasting on which many computational problems can be solved w...
Jong Hyuk Choi, Bong Wan Kim, Kyu Ho Park, Kwang-I...
AGENTS
1999
Springer
15 years 2 months ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
15 years 2 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
« Prev « First page 1750 / 1825 Last » Next »