Sciweavers

2804 search results - page 506 / 561
» Next Generation Internet
Sort
View
ICMCS
1998
IEEE
86views Multimedia» more  ICMCS 1998»
14 years 29 days ago
Virtual Recovery of Excavated Archaeological Finds
This work aims at a virtual recovery of excavated archaeological finds in cyberspace for ancient relic preservation, archaeology research, and multimedia material generation. Many...
Jiang Yu Zheng, Zhong Li Zhang, Norihiro Abe
MICRO
1996
IEEE
173views Hardware» more  MICRO 1996»
14 years 26 days ago
Java Bytecode to Native Code Translation: The Caffeine Prototype and Preliminary Results
The Java bytecode language is emerging as a software distribution standard. With major vendors committed to porting the Java run-time environment to their platforms, programs in J...
Cheng-Hsueh A. Hsieh, John C. Gyllenhaal, Wen-mei ...
DRM
2006
Springer
14 years 11 days ago
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Susan Landau, Renée Stratulate, Doug Twille...
CCGRID
2001
IEEE
14 years 10 days ago
NwsAlarm: A Tool for Accurately Detecting Resource Performance Degradation
End-users of high-performance computing resources have come to expect that consistent levels of performance be delivered to their applications. The advancement of the Computationa...
Chandra Krintz, Richard Wolski
AINA
2008
IEEE
13 years 10 months ago
UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent
BitTorrent is one of the most well known peer-topeer file sharing applications, accounting for a significant proportion of Internet traffic. Current BitTorrent system builds its o...
Wei Li, Shanzhi Chen, Tao Yu