Sciweavers

1029 search results - page 199 / 206
» Requirements for Rich Internet Application Design Methodolog...
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Micro-Blog: sharing and querying content through mobile phones and social participation
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...
CGO
2006
IEEE
14 years 1 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
CCS
2008
ACM
13 years 9 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin
CCR
2000
113views more  CCR 2000»
13 years 7 months ago
TCP rate control
TCP congestion control 9] is designed for network stability, robustness and opportunistic use of network bu er and bandwidth resources on an end-to-end per-connection basis. Upon ...
Shrikrishna Karandikar, Shivkumar Kalyanaraman, Pr...
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
14 years 1 months ago
Unwitting distributed genetic programming via asynchronous JavaScript and XML
The success of a genetic programming system in solving a problem is often a function of the available computational resources. For many problems, the larger the population size an...
Jon Klein, Lee Spector