Sciweavers

2125 search results - page 235 / 425
» Points with Type-2 Operations
Sort
View
FAST
2010
15 years 6 months ago
Provenance for the Cloud
The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is alread...
Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I....
USENIX
2008
15 years 6 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
COLCOM
2005
IEEE
15 years 6 months ago
Object-associated telepointer for real-time collaborative document editing systems
Telepointers are a real-time groupware interface feature to indicate where other users are pointing. None of existing telepointer techniques, however, is capable of tracking the r...
Steven Xia, David Sun, Chengzheng Sun, David Chen
IMC
2007
ACM
15 years 5 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
LREC
2010
141views Education» more  LREC 2010»
15 years 5 months ago
Resources for Calendar Expressions Semantic Tagging and Temporal Navigation through Texts
The linguistic resources presented in this paper are designed for the recognition and semantic tagging of calendar expressions in French. While existing resources generally put th...
Charles Teissèdre, Delphine Battistelli, Je...