Sciweavers

13181 search results - page 2593 / 2637
» Design and Implementation of Cohesion
Sort
View
CN
2007
133views more  CN 2007»
13 years 11 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
CN
2007
100views more  CN 2007»
13 years 11 months ago
A simple FIFO-based scheme for differentiated loss guarantees
— Today’s Internet carries an ever broadening range of application traffic with different requirements. This has stressed its original, one-class, best-effort model, and has b...
Yaqing Huang, Roch Guérin
COMCOM
2007
149views more  COMCOM 2007»
13 years 11 months ago
Cache invalidation strategies for internet-based mobile ad hoc networks
Internet-based mobile ad hoc network (IMANET) combines a mobile ad hoc network (MANET) and the Internet to provide universal information accessibility. Although caching frequently...
Sunho Lim, Wang-Chien Lee, Guohong Cao, Chita R. D...
IJVR
2006
116views more  IJVR 2006»
13 years 11 months ago
New Directions in 3D User Interfaces
Three-dimensional user interfaces (3D UIs) support user tasks in many non-traditional interactive systems such as virtual environments, augmented reality, and ubiquitous computing...
Doug A. Bowman, Jian Chen, Chadwick A. Wingrave, J...
CORR
2007
Springer
146views Education» more  CORR 2007»
13 years 11 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...
« Prev « First page 2593 / 2637 Last » Next »