Sciweavers

2435 search results - page 440 / 487
» System Exploration of SystemC Designs
Sort
View
140
Voted
GROUP
2007
ACM
15 years 7 months ago
Privacy in the open: how attention mediates awareness and privacy in open-plan offices
The tension between privacy and awareness has been a persistent difficulty in distributed environments that support opportunistic and informal interaction. For example, many aware...
Jeremy P. Birnholtz, Carl Gutwin, Kirstie Hawkey
ATAL
2006
Springer
15 years 5 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
CCIA
2009
Springer
15 years 5 months ago
Shout and Act
1 We adapt the Shout and Act algorithm to Digital Objects Preservation where agents explore file systems looking for digital objects to be preserved (victims). When they find somet...
Josep Lluís de la Rosa, Albert Trias i Mans...
INFOCOM
2010
IEEE
15 years 2 months ago
Chameleon: Adaptive Peer-to-Peer Streaming with Network Coding
—Layered streaming can be used to adapt to the available download capacity of an end-user, and such adaptation is very much required in real world HTTP media streaming. The multi...
Anh Tuan Nguyen, Baochun Li, Frank Eliassen
123
Voted
WWW
2009
ACM
15 years 10 months ago
Tagommenders: connecting users to items through tags
Tagging has emerged as a powerful mechanism that enables users to find, organize, and understand online entities. Recommender systems similarly enable users to efficiently navig...
Shilad Sen, Jesse Vig, John Riedl