Sciweavers

2747 search results - page 447 / 550
» Network externalities in software systems
Sort
View
NSPW
2006
ACM
14 years 2 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
EUROPAR
2005
Springer
14 years 2 months ago
An Approach to Performance Prediction for Parallel Applications
Abstract. Accurately modeling and predicting performance for largescale applications becomes increasingly difficult as system complexity scales dramatically. Analytic predictive mo...
Engin Ipek, Bronis R. de Supinski, Martin Schulz, ...
SEKE
2005
Springer
14 years 2 months ago
Face Alive Icons
Facial expression is one of the primary communication means of the human. However, realistic facial expression images are not used in popular communication tools on portable devic...
Xin Li, Chieh-Chih Chang, Shi-Kuo Chang
ARCS
2004
Springer
14 years 2 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
HPN
1997
13 years 10 months ago
Mobiware: QoS-aware middleware for mobile multimedia communications
Next generation wireless communications system will be required to support the seamless delivery of voice, video and data with high quality. Delivering hard Quality of Service (QO...
Andrew T. Campbell