Sciweavers

859 search results - page 161 / 172
» The Changing Face of Cryptography
Sort
View
SIGOPSE
1998
ACM
15 years 1 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
ISCA
1993
IEEE
112views Hardware» more  ISCA 1993»
15 years 1 months ago
Working Sets, Cache Sizes, and Node Granularity Issues for Large-Scale Multiprocessors
The distribution of resources among processors, memory and caches is a crucial question faced by designers of large-scale parallel machines. If a machine is to solve problems with...
Edward Rothberg, Jaswinder Pal Singh, Anoop Gupta
FTDCS
2004
IEEE
15 years 1 months ago
Autonomous Decentralized Community Construction Technology to Assure Quality of Services
Recent advances in the wireless communication and mobile telecommunications have made mobile commerce possible. In the retail business under the evolving market, the users solicit...
Takanori Ono, Naohiro Kaji, Yuji Horikoshi, Hisayu...
101
Voted
ISMIR
2000
Springer
148views Music» more  ISMIR 2000»
15 years 1 months ago
IR for Contemporary Music: What the Musicologist Needs
Active listening is the core of musical activity Listening does not only concern receiving musical information. On the contrary, it is "active" and based on a set of int...
Alain Bonardi
WEBDB
2000
Springer
128views Database» more  WEBDB 2000»
15 years 1 months ago
Architecting a Network Query Engine for Producing Partial Results
The growth of the Internet has made it possible to query data in all corners of the globe. This trend is being abetted by the emergence of standards for data representation, such ...
Jayavel Shanmugasundaram, Kristin Tufte, David J. ...