Sciweavers

3937 search results - page 589 / 788
» Questioning Ubiquitous Computing
Sort
View
102
Voted
FOCS
2007
IEEE
15 years 8 months ago
Round Complexity of Authenticated Broadcast with a Dishonest Majority
Broadcast among n parties in the presence of t ≥ n/3 malicious parties is possible only with some additional setup. The most common setup considered is the existence of a PKI an...
Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafai...
ICIW
2007
IEEE
15 years 8 months ago
A Faceted Approach to Service Specification
Service-centric computing is developing and maturing rapidly as a paradigm for developing distributed systems. In recent years there has been a rapid growth in the number and type...
James Walkerdine, John Hutchinson, Peter Sawyer, G...
115
Voted
ICNS
2007
IEEE
15 years 8 months ago
A Distributed Service Manager for Seamless Service Continuity
—The IT domain has considerably evolved, users are now surrounded with cheaper and more powerful terminals than ever. Mobile and fixed devices connected to high-speed network tec...
Vincent Verdot, Noël Crespi, Yann Gaste
115
Voted
IPPS
2007
IEEE
15 years 8 months ago
Replication Strategy in Unstructured Peer-to-Peer Systems
1 The unstructured Peer-to-Peer (P2P) systems usually use a “blind search” method to find the requested data object by propagating a query to a number of peers randomly. In or...
Guofu Feng, Yuquan Jiang, Guihai Chen, Qing Gu, Sa...
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
15 years 8 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson