Sciweavers

12568 search results - page 2378 / 2514
» Selective user interaction
Sort
View
PERCOM
2003
ACM
14 years 9 months ago
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks
A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. ...
Sethuram Balaji Kodeswaran, Olga Ratsimore, Anupam...
ICDCS
2009
IEEE
14 years 6 months ago
File Versioning for Block-Level Continuous Data Protection
Block-level continuous data protection (CDP) logs every disk block update so that disk updates within a time window are undoable. Standard file servers and DBMS servers can enjoy...
Maohua Lu, Tzi-cker Chiueh

Source Code
579views
14 years 5 months ago
The CImg Library
The CImg Library is an open source, C++ toolkit for image processing, designed with these properties in mind : Usefulness CImg defines classes and methods to manage images in y...
David Tschumperlé
CCS
2009
ACM
14 years 4 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
WCRE
2009
IEEE
14 years 4 months ago
Enabling the Evolution of J2EE Applications through Reverse Engineering and Quality Assurance
Abstract—Enterprise Applications are complex software systems that manipulate much persistent data and interact with the user through a vast and complex user interface. In partic...
Fabrizio Perin
« Prev « First page 2378 / 2514 Last » Next »