Sciweavers

2747 search results - page 305 / 550
» Network externalities in software systems
Sort
View
UIST
2000
ACM
14 years 2 months ago
A programming model for active documents
Traditionally, designers organize software system as active end-points (e.g. applications) linked by passive infrastructures (e.g. networks). Increasingly, however, networks and i...
Paul Dourish, W. Keith Edwards, Jon Howell, Anthon...
WCNC
2010
IEEE
14 years 2 months ago
Cross Layer Implementation of a Multi-User MIMO Test-Bed
Abstract—This paper describes an implementation of a realtime multi-user multiple-input multiple-output (MU-MIMO) communication system, with cross-layer channel-aware scheduling....
Niklas Jalden, Svante Bergman, Per Zetterberg, Bj&...
OSDI
2008
ACM
14 years 10 months ago
Live Migration of Direct-Access Devices
Virtual machine migration greatly aids management by allowing flexible provisioning of resources and decommissioning of hardware for maintenance. However, efforts to improve netwo...
Asim Kadav, Michael M. Swift
ASSETS
2006
ACM
14 years 4 months ago
A Cisco education tool accessible to the vision impaired
This paper describes iNetSim, a universally accessible network simulator, created to allow vision-impaired and sighted users to complete Cisco Certified Network Associate level tw...
J. Hope, Brian R. von Konsky, I. Murray, L. C. Che...
JSW
2008
98views more  JSW 2008»
13 years 10 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng