Sciweavers

1477 search results - page 229 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 2 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
WECWIS
2009
IEEE
142views ECommerce» more  WECWIS 2009»
14 years 2 months ago
DySCon: Dynamic Sharing Control for Distributed Team Collaboration in Networked Enterprises
– Networked enterprises create virtual teams of distributed experts belonging to different enterprises where one user can be part of multiple teams; How to effectively control th...
Ahmad Kamran Malik, Hong Linh Truong, Schahram Dus...
ICEIS
2009
IEEE
14 years 2 months ago
Creation and Maintenance of Query Expansion Rules
In an information retrieval system, a thesaurus can be used for query expansion, i.e. adding words to queries in order to improve recall. We propose a semi-automatic and interactiv...
Stefania Castellani, Aaron N. Kaplan, Fréd&...
ICNP
2009
IEEE
14 years 2 months ago
Declarative Policy-based Adaptive MANET Routing
—This paper presents the design and implementation of declarative policy-based adaptive MANET routing protocols. Our work builds upon declarative networking, a recent innovation ...
Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwi...
INFOCOM
2009
IEEE
14 years 2 months ago
CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast
—We present CPM, a unified approach that exploits server multicast, assisted by peer downloads, to provide efficient video-on-demand (VoD) in a service provider environment. We...
Vijay Gopalakrishnan, Samrat Bhattacharjee, K. K. ...