Sciweavers

1140 search results - page 170 / 228
» Active Information Networks and XML
Sort
View
SISW
2005
IEEE
14 years 4 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
ICC
2009
IEEE
159views Communications» more  ICC 2009»
14 years 5 months ago
Evidences Behind Skype Outage
—Skype is one of the most successful VoIP application in the current Internet spectrum. One of the most peculiar characteristics of Skype is that it relies on a P2P infrastructur...
Dario Rossi, Marco Mellia, Michela Meo
SAIG
2001
Springer
14 years 2 months ago
MetaKlaim: Meta-programming for Global Computing
Most foundational models for global computing have focused on the spatial dimension of computations, however global computing requires also new ways of thinking about the temporal ...
Gian Luigi Ferrari, Eugenio Moggi, Rosario Puglies...
LREC
2008
111views Education» more  LREC 2008»
13 years 11 months ago
MEDAR: Collaboration between European and Mediterranean Arabic Partners to Support the Development of Language Technology for Ar
After the successful completion of the NEMLAR project 2003-2005, a new opportunity for a project was opened by the European Commission, and a group of largely the same partners is...
Bente Maegaard, Mohammed Atiyya, Khalid Choukri, S...
WSC
1997
13 years 11 months ago
Using Compensating Reconfiguration to Maintain Military Distributed Simulations
In Department of Defense (DoD) distributed training simulations, events occur that can cause unrealistic behavior. These events can be system events, such as the loss of a hostor ...
Donald J. Welch, James M. Purtilo