Sciweavers

3441 search results - page 652 / 689
» Provenance of Software Development Processes
Sort
View
WOSP
2004
ACM
14 years 4 months ago
Using locality of reference to improve performance of peer-to-peer applications
Peer-to-peer, or simply P2P, systems have recently emerged as a popular paradigm for building distributed applications. One key aspect of the P2P system design is the mechanism us...
Marcelo Werneck Barbosa, Melissa Morgado Costa, Ju...
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 4 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
14 years 4 months ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli
COMPSAC
2002
IEEE
14 years 4 months ago
Design and Implementation of a Network Application Architecture for Thin Clients
This paper explores the issues and the techniques of enabling multimedia applications for the thin client computing. A prototype of a video communication system based on H.323 fam...
Chia-Chen Kuo, Ping Ting, Ming-Syan Chen, Jeng-Chu...
DEXAW
2002
IEEE
148views Database» more  DEXAW 2002»
14 years 4 months ago
A Practical Approach to Multi-Attribute Auctions
In most electronic auctions conducted over the Internet today price is still the only decision criteria for the best bid. This is true for all sorts of auctions in the electronic ...
Birgit Burmeister, Tobias Ihde, Thomas Kittsteiner...