Sciweavers

34202 search results - page 6732 / 6841
» The Tera computer system
Sort
View
STOC
2004
ACM
138views Algorithms» more  STOC 2004»
14 years 2 months ago
Know thy neighbor's neighbor: the power of lookahead in randomized P2P networks
Several peer-to-peer networks are based upon randomized graph topologies that permit efficient greedy routing, e.g., randomized hypercubes, randomized Chord, skip-graphs and const...
Gurmeet Singh Manku, Moni Naor, Udi Wieder
SWS
2004
ACM
14 years 2 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
UIST
2004
ACM
14 years 2 months ago
A toolkit for managing user attention in peripheral displays
Traditionally, computer interfaces have been confined to conventional displays and focused activities. However, as displays become embedded throughout our environment and daily li...
Tara Matthews, Anind K. Dey, Jennifer Mankoff, Sco...
VRST
2004
ACM
14 years 2 months ago
Observing effects of attention on presence with fMRI
Presence is one of the goals of many virtual reality systems. Historically, in the context of virtual reality, the concept of presence has been associated much with spatial percep...
Sungkil Lee, Gerard Jounghyun Kim, Janghan Lee
WMASH
2004
ACM
14 years 2 months ago
Smart edge server: beyond a wireless access point
Wireless access at cafes, airports, homes and businesses have proliferated all over the globe with several different Wireless Internet Service Providers. Similarly, digital media ...
Geetha Manjunath, Tajana Simunic, Venkatesh Krishn...
« Prev « First page 6732 / 6841 Last » Next »