Sciweavers

13966 search results - page 2690 / 2794
» The Internet a
Sort
View
SIGMOD
1997
ACM
166views Database» more  SIGMOD 1997»
15 years 5 months ago
The InfoSleuth Project
The goal of the InfoSleuth project at MCC is to exploit and synthesize new technologies into a uni ed system that retrieves and processes information in an ever-changing network o...
Roberto J. Bayardo Jr., William Bohrer, Richard S....
STOC
1997
ACM
257views Algorithms» more  STOC 1997»
15 years 5 months ago
Practical Loss-Resilient Codes
We present randomized constructions of linear-time encodable and decodable codes that can transmit over lossy channels at rates extremely close to capacity. The encoding and decod...
Michael Luby, Michael Mitzenmacher, Mohammad Amin ...
VL
1996
IEEE
117views Visual Languages» more  VL 1996»
15 years 5 months ago
Tactile Programming: A Unified Manipulation Paradigm Supporting Program Comprehension, Composition and Sharing
Although visual programming techniques have been used to lower the threshold of programming for end users, they are not sufficient for creating end user programming environments t...
Alexander Repenning, James Ambach
MOBICOM
1996
ACM
15 years 5 months ago
Low-Loss TCP/IP Header Compression for Wireless Networks
Wireless is becoming a popular way to connect mobile computers to the Internet and other networks. The bandwidth of wireless links will probably always be limited due to propertie...
Mikael Degermark, Mathias Engan, Björn Nordgr...
MOBICOM
1996
ACM
15 years 5 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
« Prev « First page 2690 / 2794 Last » Next »