Sciweavers

832 search results - page 130 / 167
» Effect of Malicious Synchronization
Sort
View
CHI
2007
ACM
14 years 10 months ago
Design and evaluation of 3d models for electronic dental records
We present the results of a field study of some of the work practices and software used by dentists. We also present the design, implementation, and evaluation of a user interface...
Michael F. Marotta, Purin Phanichphant, Patrick Ma...
PERCOM
2003
ACM
14 years 9 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
MOBIHOC
2005
ACM
14 years 9 months ago
Timed grid routing (TIGR) bites off energy
Energy efficiency and collisions avoidance are both critical properties to increase the lifetime and effectiveness of wireless networks. This paper proposes a family of algorithms...
Roy Friedman, Guy Korland
ICDCS
2009
IEEE
14 years 7 months ago
Implementing a Register in a Dynamic Distributed System
Providing distributed processes with concurrent objects is a fundamental service that has to be offered by any distributed system. The classical shared read/write register is one ...
Roberto Baldoni, Silvia Bonomi, Anne-Marie Kermarr...
EUROSYS
2009
ACM
14 years 7 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...