Sciweavers

1744 search results - page 166 / 349
» The Steganographic File System
Sort
View
155
Voted
MHCI
2005
Springer
15 years 9 months ago
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. ‘FarCry’ uses the mobility of users to carry files between separated networks. Throu...
Paul Tennent, Malcolm Hall, Barry Brown, Matthew C...
145
Voted
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
13 years 11 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
MTSR
2007
Springer
15 years 10 months ago
A Distributed Architecture for Harvesting Metadata Describing Organizations in the Agriculture Sector
Providing easy access to updated, accurate and semantically meaningful information about organizations working in the agriculture sector is of primary importance in agricultural in...
Valeria Pesce, Maru Ajit, Gauri Salokhe, Johannes ...
102
Voted
SIGMETRICS
1999
ACM
15 years 8 months ago
Performance Issues in WWW Servers
—This paper evaluates techniques for improving operating system and network protocol software support for high-performance World Wide Web servers. We study approaches in three ca...
Erich M. Nahum, Tsipora P. Barzilai, Dilip D. Kand...
138
Voted
AP2PC
2007
Springer
15 years 5 months ago
Enabling Grassroots Distributed Computing with CompTorrent
This paper describes the operational characteristics of “CompTorrent”, a general purpose distributed computing platform that provides a low entry cost to creating new distribut...
Bradley Goldsmith