Sciweavers

6808 search results - page 1246 / 1362
» Distributed Concurrency Control
Sort
View
159
Voted
ICFP
2010
ACM
15 years 3 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
CE
2008
128views more  CE 2008»
15 years 2 months ago
Beyond threaded discussion: Representational guidance in asynchronous collaborative learning environments
Although most online learning environments are predominately text based, researchers have argued that representational support for the conceptual structure of a problem would addr...
Daniel D. Suthers, Ravi K. Vatrapu, Richard Medina...
131
Voted
CN
2006
112views more  CN 2006»
15 years 2 months ago
Optimal server allocations for streaming multimedia applications on the Internet
In this paper, we address the server selection problem for streaming applications on the Internet. The architecture we consider is similar to the content distribution networks con...
Padmavathi Mundur, Poorva Arankalle
JCP
2007
154views more  JCP 2007»
15 years 2 months ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri
140
Voted
JSAC
2007
180views more  JSAC 2007»
15 years 2 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
« Prev « First page 1246 / 1362 Last » Next »