Sciweavers

24529 search results - page 4803 / 4906
» Computing on Authenticated Data
Sort
View
ACMICEC
2003
ACM
118views ECommerce» more  ACMICEC 2003»
15 years 7 months ago
Visualization of EDI messages: facing the problems in the use of XML
Multi-organizational EDI message networks are complicated communication environments with various standards and technologies. The role of third party message exchange hubs has bec...
Reija Korhonen, Airi Salminen
IMC
2003
ACM
15 years 7 months ago
Best-path vs. multi-path overlay routing
Time-varying congestion on Internet paths and failures due to software, hardware, and configuration errors often disrupt packet delivery on the Internet. Many aproaches to avoidi...
David G. Andersen, Alex C. Snoeren, Hari Balakrish...
ISLPED
2003
ACM
115views Hardware» more  ISLPED 2003»
15 years 7 months ago
Reducing energy and delay using efficient victim caches
In this paper, we investigate methods for improving the hit rates in the first level of memory hierarchy. Particularly, we propose victim cache structures to reduce the number of ...
Gokhan Memik, Glenn Reinman, William H. Mangione-S...
IUI
2003
ACM
15 years 7 months ago
Lessons learned in modeling schizophrenic and depressed responsive virtual humans for training
This paper describes lessons learned in developing the linguistic, cognitive, emotional, and gestural models underlying virtual human behavior in a training application designed t...
Robert C. Hubal, Geoffrey A. Frank, Curry I. Guinn
139
Voted
MOBICOM
2003
ACM
15 years 7 months ago
Topology control for wireless sensor networks
We consider a two-tiered Wireless Sensor Network (WSN) consisting of sensor clusters deployed around strategic locations and base-stations (BSs) whose locations are relatively fl...
Jianping Pan, Yiwei Thomas Hou, Lin Cai, Yi Shi, S...
« Prev « First page 4803 / 4906 Last » Next »