Sciweavers

472 search results - page 59 / 95
» What Networking of Information Can Do for Cloud Computing
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz
HUC
2011
Springer
12 years 7 months ago
Understanding my data, myself: supporting self-reflection with ubicomp technologies
We live in a world where many kinds of data about us can be collected and more will be collected as Ubicomp technologies mature. People reflect on this data using different tools ...
Ian Li, Anind K. Dey, Jodi Forlizzi
CF
2004
ACM
14 years 1 months ago
An information-interconnectivity-based retrieval method for network attached storage
Network attached disk storage is characterized by independent network attachment and embedded intelligence. For Internet applications, it provides the key functionality of geograp...
Iliyak Georgiev, Ivo I. Georgiev
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 27 days ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
MOBIHOC
2004
ACM
14 years 1 months ago
An adaptive strategy for maximizing throughput in MAC layer wireless multicast
Bandwidth efficiency of wireless multicast can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. T...
Prasanna Chaporkar, Anita Bhat, Saswati Sarkar