Sciweavers

1744 search results - page 234 / 349
» The Steganographic File System
Sort
View
WSC
2001
15 years 5 months ago
A practical bottleneck detection method
This paper describes a novel method for detecting the bottleneck in a discrete event system by examining the average duration of a machine being active for all machines. The machi...
Christoph Roser, Masaru Nakano, Minoru Tanaka
GEOINFORMATICA
2006
103views more  GEOINFORMATICA 2006»
15 years 4 months ago
Building and Querying a P2P Virtual World
Peer-to-Peer (P2P) systems are known to provide excellent scalability in a networked environment. One peer is introduced to the system by each participant. However current P2P app...
Egemen Tanin, Aaron Harwood, Hanan Samet, Deepa Na...
IIE
2006
183views more  IIE 2006»
15 years 4 months ago
Desktop Tools for Offline Plagiarism Detection in Computer Programs
Plagiarism in universities has always been a difficult problem to overcome. Various tools have been developed over the past few years to help teachers detect plagiarism in students...
Maxim Mozgovoy
CCR
2005
126views more  CCR 2005»
15 years 4 months ago
Large scale content distribution protocols
This paper introduces large scale content distribution protocols, which are capable of scaling to massive numbers of users and providing low delay end-to-end delivery. Delivery of...
Christoph Neumann, Vincent Roca, Rod Walsh
CACM
1999
108views more  CACM 1999»
15 years 4 months ago
Privacy Interfaces for Information Management
To facilitate the sharing of information using modern communication networks, users must be able to decide on a privacy policy--what information to conceal, what to reveal, and to...
Tessa A. Lau, Oren Etzioni, Daniel S. Weld