Sciweavers

158 search results - page 3 / 32
» Conference Keynote Address
Sort
View
DASFAA
2006
IEEE
220views Database» more  DASFAA 2006»
14 years 1 months ago
KEYNOTE: Keyword Search by Node Selection for Text Retrieval on DHT-Based P2P Networks
Efficient full-text keyword search remains a challenging problem in P2P systems. Most of the traditional keyword search systems on DHT overlay networks perform the join operation ...
Zheng Zhang, Shuigeng Zhou, Weining Qian, Aoying Z...
CHI
2011
ACM
12 years 10 months ago
Synchronous interaction among hundreds: an evaluation of a conference in an avatar-based virtual environment
This paper presents the first in-depth evaluation of a large multi-format virtual conference. The conference took place in an avatar-based 3D virtual world with spatialized audio,...
Thomas Erickson, N. Sadat Shami, Wendy A. Kellogg,...
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
13 years 4 months ago
Audio-visual privacy protection for video conference
Group video-conferencing systems are routinely used in major corporations, hospitals and universities for meetings, tele-medicine and distance learning among participants from very...
M. Vijay Venkatesh, Jian Zhao, L. Profitt, Sen-Chi...
IANDC
2010
115views more  IANDC 2010»
13 years 4 months ago
18th International Conference on Concurrency Theory
We consider message sequence charts enriched with timing constraints between pairs of events. As in the untimed setting, an infinite family of time-constrained message sequence cha...
Luís Caires, Vasco Thudichum Vasconcelos
CCS
2000
ACM
13 years 11 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....