Sciweavers

997 search results - page 179 / 200
» Towards Computation over Communities
Sort
View
111
Voted
ICISS
2007
Springer
15 years 7 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
MOBICOM
2005
ACM
15 years 7 months ago
Architecture and evaluation of an unplanned 802.11b mesh network
This paper evaluates the ability of a wireless mesh architecture to provide high performance Internet access while demanding little deployment planning or operational management. ...
John C. Bicket, Daniel Aguayo, Sanjit Biswas, Robe...
COORDINATION
2004
Springer
15 years 7 months ago
Active Coordination in Ad Hoc Networks
The increasing ubiquity of mobile devices has led to an explosion in the development of applications tailored to the particular needs of individual users. As the research communit...
Christine Julien, Gruia-Catalin Roman
100
Voted
ICCS
2003
Springer
15 years 6 months ago
Method Call Acceleration in Embedded Java Virtual Machines
Object oriented languages, in particular Java, use a frequent dynamic dispatch mechanism to search for the definition of an invoked method. A method could be defined in more than...
Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia...
139
Voted
ADBIS
2000
Springer
166views Database» more  ADBIS 2000»
15 years 5 months ago
Integrating Bibliographical Data from Heterogeneous Digital Libraries
The integration of bibliographical data today is considered one of the most important tasks in the area of digital libraries. Various available sources of bibliographical informati...
Eike Schallehn, Martin Endig, Kai-Uwe Sattler