Sciweavers

502 search results - page 87 / 101
» Partial Lookup Service
Sort
View
CCS
2007
ACM
14 years 2 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
STORAGESS
2006
ACM
14 years 1 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...
PLDI
2005
ACM
14 years 1 months ago
Programming ad-hoc networks of mobile and resource-constrained devices
Ad-hoc networks of mobile devices such as smart phones and PDAs represent a new and exciting distributed system architecture. Building distributed applications on such an architec...
Yang Ni, Ulrich Kremer, Adrian Stere, Liviu Iftode
WOSP
2004
ACM
14 years 1 months ago
Early performance testing of distributed software applications
Performance characteristics, such as response time, throughput and scalability, are key quality attributes of distributed applications. Current practice, however, rarely applies s...
Giovanni Denaro, Andrea Polini, Wolfgang Emmerich
ISCAS
2003
IEEE
106views Hardware» more  ISCAS 2003»
14 years 1 months ago
Resource adaptation based on MPEG-21 usage environment descriptions
This paper addresses several aspects related to the distribution of content. The first aim is to provide an overview of the Universal Multimedia Access (UMA) concept. The primary...
Huifang Sun, Anthony Vetro, K. Asai