Sciweavers

1375 search results - page 99 / 275
» Matching Points with Things
Sort
View
130
Voted
ISSTA
2006
ACM
15 years 9 months ago
Towards an architectural approach for the dynamic and automatic composition of software components
In a component-based software system the components are specified, designed and implemented with the intention to be reused, and are assembled in various contexts in order to pro...
Antonio Bucchiarone, Andrea Polini, Patrizio Pelli...
93
Voted
MM
2004
ACM
94views Multimedia» more  MM 2004»
15 years 9 months ago
Planet usher: an interactive home movie
This essay investigates the peculiar situation of a new media project which takes as its raw material the home-video archive of a deaf man gone blind. In an attempt to revive this...
Patrick Tarrant
135
Voted
GI
2004
Springer
15 years 9 months ago
Comparison of Load Balancing Algorithms for Structured Peer-to-Peer Systems
Abstract: Among other things, Peer-to-Peer (P2P) systems are very useful for managing large amounts of widely distributed data. Distributed Hash Tables (DHT) offer a highly scalabl...
Simon Rieche, Leo Petrak, Klaus Wehrle
119
Voted
HUC
2004
Springer
15 years 9 months ago
The NearMe Wireless Proximity Server
Abstract. NearMe is a server, algorithms, and application programming interfaces (APIs) for clients equipped with 802.11 wireless networking (Wi-Fi) to compute lists of people and ...
John Krumm, Ken Hinckley
154
Voted
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
15 years 8 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu