Sciweavers

360 search results - page 31 / 72
» Remote Access of Computer Controlled Experiments
Sort
View
INFOCOM
2003
IEEE
14 years 27 days ago
Evaluation of an Adaptive Transport Protocol
—Applications on mobile computers must adapt to high variability in wireless network performance. Extending the semantics of transport protocols to offer more control over commun...
Benjamin Atkin, Kenneth P. Birman
COOPIS
1998
IEEE
13 years 12 months ago
Context Mediation on Wall Street
This paper reports on a practical implementation of a context mediator for the fixed income securities industry. We describe industry circumstances and the data and calculation se...
Allen Moulton, Stuart E. Madnick, Michael Siegel
CLOUD
2010
ACM
14 years 21 days ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
CCS
2007
ACM
14 years 1 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
DSN
2009
IEEE
14 years 2 months ago
Intrusion-tolerant self-healing devices for critical infrastructure protection
Critical infrastructures like the power grid are essentially physical processes controlled by electronic devices. In the last decades, these electronic devices started to be contr...
Paulo Sousa, Alysson Neves Bessani, Wagner Saback ...