Sciweavers

2714 search results - page 176 / 543
» Under the table interaction
Sort
View
131
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Turning Heterogeneity into an Advantage in Overlay Routing
Abstract— Distributed hash table (DHT)-based overlay networks, represented by Pastry, CAN, and Chord, offer an administration-free and fault-tolerant application-level overlay ne...
Zhichen Xu, Mallik Mahalingam, Magnus Karlsson
RTSS
2002
IEEE
15 years 8 months ago
Embedded System Design Framework for Minimizing Code Size and Guaranteeing Real-Time Requirements
In addition to real-time requirements, the program code size is a critical design factor for real-time embedded systems. To take advantage of the code size vs. execution time trad...
Insik Shin, Insup Lee, Sang Lyul Min
115
Voted
NLDB
2001
Springer
15 years 8 months ago
"Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations
At Hewlett-Packard Laboratories we want to know how inexpensive it can be to endow mobile personal assistants with the ability to speak naturally with their users. To this end, we ...
Lewis G. Creary, Michael VanHilst
184
Voted
ISD
1999
Springer
262views Database» more  ISD 1999»
15 years 7 months ago
Spatial Pictogram Enhanced Conceptual Data Models and Their Translation to Logical Data Models
The successful development of any geographic information system project needs the careful design and implementation of spatial databases via conceptual and logical data-modeling. T...
Shashi Shekhar, Ranga Raju Vatsavai, Sanjay Chawla...
131
Voted
ICCCN
1998
IEEE
15 years 7 months ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer