Sciweavers

9015 search results - page 1698 / 1803
» Using Structural Computing to Support Information Integratio...
Sort
View
ESORICS
2007
Springer
15 years 8 months ago
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we int...
Juan Carlos López Pimentel, Raul Monroy, Di...
PERCOM
2006
ACM
15 years 8 months ago
A High-throughput MAC Protocol for Wireless Ad Hoc Networks
One way to improve the throughput of a wireless ad hoc network at the media access (MAC) layer is to allow concurrent transmission among neighboring nodes as much as possible. In ...
Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong ...
115
Voted
ACMACE
2006
ACM
15 years 8 months ago
AI-based world behaviour for emergent narratives
Research in Interactive Narrative has developed new approaches to the behaviour of virtual actors, but has dedicated little attention to the physical behaviour of the environment ...
Jean-Luc Lugrin, Marc Cavazza
CSCW
2006
ACM
15 years 8 months ago
Email overload at work: an analysis of factors associated with email strain
Almost every office worker can relate to feelings of email overload and stress, but in reality the concept of email strain is not well understood. In this paper, we describe a lar...
Laura A. Dabbish, Robert E. Kraut
116
Voted
ICDE
2005
IEEE
125views Database» more  ICDE 2005»
15 years 7 months ago
QoSMig: Adaptive Rate-Controlled Migration of Bulk Data in Storage Systems
Abstract— Logical reorganization of data and requirements of differentiated QoS in information systems necessitate bulk data migration by the underlying storage layer. Such data ...
Koustuv Dasgupta, Sugata Ghosal, Rohit Jain, Upend...
« Prev « First page 1698 / 1803 Last » Next »