Sciweavers

3052 search results - page 14 / 611
» Weakly Distributive Domains
Sort
View
ICDCS
2000
IEEE
15 years 2 months ago
On Supporting Weakly-Connected Browsing in a Mobile Web Environment
A mobile environment is weakly-connected, characterized by low communication bandwidth and poor connectivity. Conventional paradigm for sur ng mobile web documents is ine ective s...
Antonio Si, Hong Va Leong, Dennis McLeod, Stanley ...
CONCUR
1994
Springer
15 years 1 months ago
Weak Sequential Composition in Process Algebras
Abstract. In this paper we study a special operator for sequential composition, which is de ned relative to a dependency relation over the actions of a given system. The idea is th...
Arend Rensink, Heike Wehrheim
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 7 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
103
Voted
DSN
2006
IEEE
15 years 3 months ago
Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony
This paper considers the eventual leader election problem in asynchronous message-passing systems where an arbitrary number t of processes can crash (t < n, where n is the tota...
Antonio Fernández, Ernesto Jiménez, ...
PCM
2009
Springer
98views Multimedia» more  PCM 2009»
15 years 2 months ago
Secure Domain Architecture for Interoperable Content Distribution
Authorized domains are used to share digital content among multiple devices without violating the copyright issues. However, if a domain is composed of multiple devices supporting ...
Lei Lei Win, Tony Thomas, Sabu Emmanuel, Mohan S. ...