Sciweavers

563 search results - page 110 / 113
» A theory-based alternative for the design of instruction: fu...
Sort
View
SIGMETRICS
2004
ACM
14 years 1 months ago
Multicast protocols for scalable on-demand download
Previous scalable protocols for downloading large, popular files from a single server include batching and cyclic multicast. With batching, clients wait to begin receiving a reque...
Niklas Carlsson, Derek L. Eager, Mary K. Vernon
INFOCOM
1999
IEEE
13 years 12 months ago
Enhancing Survivability of Mobile Internet Access Using Mobile IP with Location Registers
The Mobile IP (MIP) protocol for IP version 4 provides continuous Internet connectivity to mobile hosts. However, currently it has some drawbacks in the areas of survivability, per...
Ravi Jain, Thomas Raleigh, Danny Yang, Li-Fung Cha...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ASSETS
2005
ACM
13 years 9 months ago
Verification of computer display pre-compensation for visual aberrations in an artificial eye
The possibility of pre-compensating images in a computer display according to the visual aberrations previously assessed in an optical system (e.g., the computer user’s eye) has...
Miguel Alonso Jr., Armando Barreto, Julie A. Jacko...
MC
2007
149views Computer Science» more  MC 2007»
13 years 9 months ago
Embodied Media and Mixed Reality for Social and Physical Interactive Communication and Entertainment
This talk outlines new facilities within human media spaces supporting embodied interaction between humans, animals, and computation both socially and physically, with the aim of ...
Adrian David Cheok