Sciweavers

14809 search results - page 2867 / 2962
» Model transformation by demonstration
Sort
View
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
SIGMETRICS
2005
ACM
105views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
An interposed 2-Level I/O scheduling framework for performance virtualization
I/O consolidation is a growing trend in production environments due to the increasing complexity in tuning and managing storage systems. A consequence of this trend is the need to...
Jianyong Zhang, Anand Sivasubramaniam, Alma Riska,...
VRST
2005
ACM
14 years 3 months ago
A 2D-3D integrated environment for cooperative work
This paper proposes a novel tabletop display system for natural communication and flexible information sharing. The proposed system is specifically designed for integration of 2...
Kousuke Nakashima, Takashi Machida, Kiyoshi Kiyoka...
ATAL
2005
Springer
14 years 3 months ago
Designing multiparty interaction support in Elva, an embodied tour guide
Although social research into group interaction has flourished since the 20th century, the technology of embodied conversational agents for handling multiparty interaction is stil...
Jun Zheng, Xiang Yuan, Yam San Chee
CCS
2005
ACM
14 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
« Prev « First page 2867 / 2962 Last » Next »