Sciweavers

747 search results - page 94 / 150
» Toward a software development methodology for anonymity appl...
Sort
View
COMPSAC
2009
IEEE
14 years 3 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
CHI
2004
ACM
14 years 9 months ago
Designing smooth connections between worlds
Currently there is a lack of explicit theories and few detailed guidelines to support the development of Mixed Reality (MR) technology and its varied applications. This research f...
Daniela Gorski Trevisan
CGO
2011
IEEE
13 years 16 days ago
Phase-based tuning for better utilization of performance-asymmetric multicore processors
—The latest trend towards performance asymmetry among cores on a single chip of a multicore processor is posing new challenges. For effective utilization of these performanceasym...
Tyler Sondag, Hridesh Rajan
ISPASS
2005
IEEE
14 years 2 months ago
Analysis of Network Processing Workloads
Abstract— Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality inside the network. Mode...
Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf
SIGMOD
2001
ACM
135views Database» more  SIGMOD 2001»
14 years 9 months ago
The Network is the Database: Data Management for Highly Distributed Systems
This paper describes the methodology and implementation of a data management system for highly distributed systems, which was built to solve the scalability and reliability proble...
Julio C. Navas, Michael J. Wynblatt