Sciweavers

414 search results - page 78 / 83
» Analyzing and Designing of the Classroom Teaching System Bas...
Sort
View
AEI
2004
114views more  AEI 2004»
13 years 7 months ago
Physical concept ontology for the knowledge intensive engineering framework
Knowledge intensive engineering aims at flexible applications of a variety of product life cycle knowledge, such as design, manufacturing, operations, maintenance, and recycling. ...
Masaharu Yoshioka, Yasushi Umeda, Hideaki Takeda, ...
CCS
2009
ACM
14 years 8 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
IEEEPACT
2007
IEEE
14 years 2 months ago
Performance Portable Optimizations for Loops Containing Communication Operations
Effective use of communication networks is critical to the performance and scalability of parallel applications. Partitioned Global Address Space languages like UPC bring the pro...
Costin Iancu, Wei Chen, Katherine A. Yelick
P2P
2009
IEEE
115views Communications» more  P2P 2009»
14 years 2 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
CCS
2001
ACM
14 years 7 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé