Sciweavers

617 search results - page 98 / 124
» On the design of hybrid peer-to-peer systems
Sort
View
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
13 years 11 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
CHI
2006
ACM
14 years 8 months ago
Getting a grip on tangible interaction: a framework on physical space and social interaction
Our current understanding of human interaction with hybrid or augmented environments is very limited. Here we focus on `tangible interaction', denoting systems that rely on e...
Eva Hornecker, Jacob Buur
CHI
2005
ACM
14 years 8 months ago
Chit chat club: bridging virtual and physical space for social interaction
In this work, we create an audio-video link via an interactive sculpture to facilitate casual, sociable communication between two remote spaces. This communication installation wa...
Karrie Karahalios, Kelly Dobson
ICMCS
2010
IEEE
236views Multimedia» more  ICMCS 2010»
13 years 8 months ago
Practical algorithm for minimum delay peer-to-peer media streaming
Though the existence of a minimum delay peer-to-peer media streaming scheme has been shown (under the name of snowball streaming), no actual algorithm has ever been designed so fa...
Jun Luo
MSWIM
2004
ACM
14 years 1 months ago
An enhanced HCF for IEEE 802.11e wireless networks
In this paper the behavior of the upcoming MAC protocol for wireless LANs IEEE 802.11e is investigated. Based on the results, we propose an enhancement for Hybrid Coordination Fun...
Balasubramanian Appiah Venkatakrishnan, S. Selvake...