Sciweavers

516 search results - page 67 / 104
» A Pattern System for Network Management Interfaces
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
NOSSDAV
1993
Springer
13 years 11 months ago
A Multimedia Enhanced Transport Service in a Quality of Service Architecture
For applications relying on the transfer of multimedia, and in particular continuous media, it is essential that quality of service (QoS) is guaranteed system-wide, including end-s...
Andrew T. Campbell, Geoff Coulson, David Hutchison
IUI
2004
ACM
14 years 1 months ago
Contextual contact retrieval
People routinely rely on physical and electronic systems to remind themselves of details regarding personal and organizational contacts. These systems include rolodexes, directori...
Jonathan Trevor, David M. Hilbert, Daniel Billsus,...
ICAI
2008
13 years 9 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
UIST
2003
ACM
14 years 1 months ago
Synchronous gestures for multiple persons and computers
This research explores distributed sensing techniques for mobile devices using synchronous gestures. These are patterns of activity, contributed by multiple users (or one user wit...
Ken Hinckley