Sciweavers

2200 search results - page 402 / 440
» Hop Integrity in Computer Networks
Sort
View
MOBIDE
2009
ACM
15 years 7 months ago
Data-aware connectivity in mobile replicated systems
Optimistic replication is a fundamental technique for supporting concurrent work practices in mobile environments. However, due to sudden and frequent transitions to weakly connec...
João Pedro Barreto, João Garcia, Lu&...
127
Voted
UM
2001
Springer
15 years 7 months ago
User Modelling in I-Help: What, Why, When and How
This paper describes user modelling in I-Help, a system to facilitate communication amongst learners. There are two I-Help components: Private and Public Discussions. In the Privat...
Susan Bull, Jim E. Greer, Gordon I. McCalla, Lori ...
ACSAC
2000
IEEE
15 years 7 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
CBMS
1999
IEEE
15 years 6 months ago
Decision Support System for Multiuser Remote Microscopy in Telepathology
Recent advances in networking, robotics, and computer technology allow today realtime diagnosis, consultation, and education by using images obtained through remote microscopy. Th...
Dorin Comaniciu, Bogdan Georgescu, Peter Meer, Wen...
184
Voted
PLDI
1999
ACM
15 years 6 months ago
Enhanced Code Compression for Embedded RISC Processors
This paper explores compiler techniques for reducing the memory needed to load and run program executables. In embedded systems, where economic incentives to reduce both ram and r...
Keith D. Cooper, Nathaniel McIntosh