Sciweavers

832 search results - page 161 / 167
» Effect of Malicious Synchronization
Sort
View
ECOOP
2008
Springer
13 years 11 months ago
Programming with Live Distributed Objects
A component revolution is underway, bringing developers improved productivity and opportunities for code reuse. However, whereas existing tools work well for builders of desktop ap...
Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong...
IE
2007
13 years 11 months ago
Speaking in character: using voice-over-IP to communicate within MMORPGs
While voice-over-IP has long been favoured as a communication medium by players of team-based online shooter games, it has recently also been appropriated by players of MMORPGs, a...
Greg Wadley, Martin R. Gibbs, Peter Benda
CSREAESA
2008
13 years 11 months ago
A Middleware for Model-Based Embedded Systems
To deal with the increasing complexity of embedded real-time systems the model-driven development approach has proven to be beneficial. The reduction of complexity achieved by the ...
Wolfgang Haberl, Jan Birke, Uwe Baumgarten
USENIX
2003
13 years 11 months ago
Operating System I/O Speculation: How Two Invocations Are Faster Than One
We present an in-kernel disk prefetcher which uses speculative execution to determine what data an application is likely to require in the near future. By placing our design withi...
Keir Faser, Fay Chang
CONEXT
2009
ACM
13 years 11 months ago
Feasibility of content dissemination between devices in moving vehicles
We investigate the feasibility of content distribution between devices mounted in moving vehicles using commodity WiFi. We assume that each device stores content in a set of files...
Thomas Zahn, Greg O'Shea, Antony I. T. Rowstron