Sciweavers

2927 search results - page 503 / 586
» Secure Distributed Human Computation
Sort
View
IWCMC
2006
ACM
15 years 8 months ago
SCAR: context-aware adaptive routing in delay tolerant mobile sensor networks
Sensor devices are being embedded in all sorts of items including vehicles, furniture but also animal and human bodies through health monitors and tagging techniques. The collecti...
Cecilia Mascolo, Mirco Musolesi
WORDS
2005
IEEE
15 years 8 months ago
Towards Self-Healing Systems via Dependable Architecture and
Self-healing systems focus on how to reducing the complexity and cost of the management of dependability policies and mechanisms without human intervention. This position paper pr...
Hong Mei, Gang Huang, Wei-Tek Tsai
ACMACE
2005
ACM
15 years 8 months ago
Fast delivery of game events with an optimistic synchronization mechanism in massive multiplayer online games
As smart players often win MMOG sessions by adopting frantic gaming strategies along the game evolution, also the system activities concerned with the distributed support of MMOGs...
Stefano Ferretti, Marco Roccetti
ACMSE
2005
ACM
15 years 8 months ago
Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing system
In this paper, we describe recent work in developing a peer-topeer collaborative environment. The study examines various locking mechanisms/policies by adjusting the granularity o...
Jon A. Preston, Sushil K. Prasad
SIGCSE
2005
ACM
116views Education» more  SIGCSE 2005»
15 years 8 months ago
A company-based framework for a software engineering course
The subject matter of a typical undergraduate software engineering course, while providing necessary background, can be quite dry. Team-based programming projects often complement...
Thomas P. Way