Sciweavers

2135 search results - page 169 / 427
» Applications and Issues in Pen-Centric Computing
Sort
View
ESORICS
2002
Springer
14 years 8 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith
ASSETS
2006
ACM
14 years 3 months ago
Dynamically adapting GUIs to diverse input devices
Many of today’s desktop applications are designed for use with a pointing device and keyboard. Someone with a disability, or in a unique environment, may not be able to use one ...
Scott Carter, Amy Hurst, Jennifer Mankoff, Jack Li
COLCOM
2005
IEEE
14 years 2 months ago
Scheduling algorithms for peer-to-peer collaborative file distribution
—Peer-to-Peer file sharing applications in the Internet, such as BitTorrent, Gnutella, etc., have been immensely popular. Prior research mainly focuses on peer and content discov...
Jonathan S. K. Chan, Victor O. K. Li, King-Shan Lu...
NETGAMES
2003
ACM
14 years 2 months ago
A multi-user framework supporting video-based avatars
The application of Networked Virtual Environment (NVE) technology on mobile devices is an emerging area in research. The marketing potential for these types of applications, when ...
Peter Quax, Tom Jehaes, Pieter Jorissen, Wim Lamot...
ISLPED
2000
ACM
99views Hardware» more  ISLPED 2000»
14 years 1 months ago
Energy minimization with guaranteed quality of service
Quality of service (QoS) is one of the key features for new Internet-based multimedia and other applications. Meanwhile, energy remains as a big concern for systems that perform s...
Gang Qu, Miodrag Potkonjak