Sciweavers

1477 search results - page 169 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
UIST
2005
ACM
14 years 2 months ago
Metisse is not a 3D desktop!
Twenty years after the general adoption of overlapping windows and the desktop metaphor, modern window systems differ mainly in minor details such as window decorations or mouse a...
Olivier Chapuis, Nicolas Roussel
WMPI
2004
ACM
14 years 2 months ago
A case for multi-level main memory
Current trends suggest that the number of memory chips per processor chip will increase at least a factor of ten in seven years. This will make DRAM cost, the space and the power i...
Magnus Ekman, Per Stenström
ITS
1998
Springer
139views Multimedia» more  ITS 1998»
14 years 1 months ago
Habitable 3D Learning Environments for Situated Learning
The growing emphasis on learner-centered education focuses on intrinsically motivated learning via engaging problem-solving activities. Habitable 3D learning environments, in which...
William H. Bares, Luke S. Zettlemoyer, James C. Le...
NSDI
2007
13 years 11 months ago
SAAR: A Shared Control Plane for Overlay Multicast
Many cooperative overlay multicast systems of diverse designs have been implemented and deployed. In this paper, we explore a new architecture for overlay multicast: we factor out...
Animesh Nandi, Aditya Ganjam, Peter Druschel, T. S...