Sciweavers

13180 search results - page 2604 / 2636
» Network Models
Sort
View
SIGCOMM
1998
ACM
14 years 3 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
ER
1998
Springer
123views Database» more  ER 1998»
14 years 3 months ago
Web Content Delivery to Heterogeneous Mobile Platforms
It is widely acknowledged that information such as web content should be adapted for mobile platforms to account for restrictions in mobile environments. As emerging mobile platfor...
Martin Gaedke, Michael Beigl, Hans-Werner Gellerse...
RANDOM
1998
Springer
14 years 3 months ago
Using Approximation Hardness to Achieve Dependable Computation
Abstract. Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended ...
Mike Burmester, Yvo Desmedt, Yongge Wang
DAC
1997
ACM
14 years 3 months ago
More Practical Bounded-Skew Clock Routing
: Academic clock routing research results has often had limited impact on industry practice, since such practical considerations as hierarchical buffering, rise-time and overshoot ...
Andrew B. Kahng, Chung-Wen Albert Tsao
SAC
1997
ACM
14 years 3 months ago
The RasDaMan approach to multidimensional database management
Multidimensional discrete data (MDD), i.e., arrays of arbitrary size, dimension, and base type, are receiving growing attention among the database community. MDD occur in a variet...
Peter Baumann, Paula Furtado, Roland Ritsch, Norbe...
« Prev « First page 2604 / 2636 Last » Next »