Sciweavers

1185 search results - page 195 / 237
» Coupon replication systems
Sort
View
133
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Understanding context: creating a lasting impact in experimental software engineering research
Software is developed for and in a vast number of contexts. Some software systems are small in size; some large. Some systems are developed by small teams; some large. Some projec...
Emerson R. Murphy-Hill, Gail C. Murphy, William G....
141
Voted
CDC
2010
IEEE
147views Control Systems» more  CDC 2010»
14 years 10 months ago
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
135
Voted
CHI
2011
ACM
14 years 7 months ago
LiquidText: a flexible, multitouch environment to support active reading
Active reading, involving acts such as highlighting, writing notes, etc., is an important part of knowledge workers’ activities. Most computer-based active reading support seeks...
Craig S. Tashman, W. Keith Edwards
127
Voted
EUROSYS
2007
ACM
16 years 20 days ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
123
Voted
SOSP
2003
ACM
16 years 14 days ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble