Sciweavers

206 search results - page 33 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
102
Voted
EUROSYS
2007
ACM
15 years 9 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...
99
Voted
INFOCOM
2008
IEEE
15 years 6 months ago
Delay Tolerant Collaborations among Campus-Wide Wireless Users
Abstract—The ubiquitous deployment of wireless LAN networks are allowing students to embrace laptops as their preferred computing platform. We investigated the viability of build...
Xuwen Yu, Surendar Chandra
100
Voted
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 5 months ago
Learning Through Telemedicine Networks
Telemedicine is advocated for its potential to improve the accessibility and quality of health care delivery while lowering costs [1]. Although the potential benefits of telemedic...
Liqiong Deng, Marshall Scott Poole
IICS
2010
Springer
15 years 4 months ago
Self-Organizing Ant-based Information Gossiping Algorithm for P2P Networks
They appeared in our life only few years ago and now they are everywhere: computers have become ubiquitous and, almost, irreplaceable. Classical ways of creating, managing and exch...
Christophe Guéret, Nicolas Monmarché...
94
Voted
NETWORKING
2007
15 years 1 months ago
Multiple Identities in BitTorrent Networks
Abstract. Peer-to-peer (P2P) file sharing systems have become ubiquitous and at present the BitTorrent (BT) based P2P systems are very popular and successful. It has been argued t...
Jin Sun, Anirban Banerjee, Michalis Faloutsos