Sciweavers

721 search results - page 118 / 145
» Exploiting Meta-Level information in a Distributed Schedulin...
Sort
View
ICDCS
2007
IEEE
14 years 2 months ago
Secure Event Dissemination in Publish-Subscribe Networks
Abstract. Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building large-scale information delivery systems. Secure event dissemination in a pub-sub ...
Mudhakar Srivatsa, Ling Liu
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
14 years 2 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen
EDOC
2006
IEEE
14 years 2 months ago
Secure Dissemination of XML Content Using Structure-based Routing
The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efficient dissemination by at the...
Ashish Kundu, Elisa Bertino
NETGAMES
2004
ACM
14 years 2 months ago
Realizing bullet time effect in multiplayer games with local perception filters
Local perception filters exploit the limitations of human perception to reduce the effects of network latency in multiplayer computer games. Because they allow temporal distorti...
Jouni Smed, Henrik Niinisalo, Harri Hakonen
IPPS
2003
IEEE
14 years 1 months ago
Implementation of a Calendar Application Based on SyD Coordination Links
System on Devices (SyD) is a specification for a middleware to enable heterogeneous collections of information, databases, or devices (such as hand-held devices) to collaborate wi...
Sushil K. Prasad, Anu G. Bourgeois, Erdogan Dogdu,...