Sciweavers

1219 search results - page 232 / 244
» Where to Look Next
Sort
View
WICON
2008
13 years 11 months ago
Exploiting parallel networks using dynamic channel scheduling
Many researchers have been focusing on the outcomes and consequences of the rapid increase and proliferation of mobile wireless technologies. If it is not already the case, it wil...
Lara B. Deek, Kevin C. Almeroth, Mike P. Wittie, K...
NSDI
2004
13 years 11 months ago
Consistent and Automatic Replica Regeneration
Reducing management costs and improving the availability of large-scale distributed systems require automatic replica regeneration, i.e., creating new replicas in response to repl...
Haifeng Yu, Amin Vahdat
IADIS
2003
13 years 11 months ago
Forecasting the Growth of ATM and POS in the Portuguese Banking System
There are several factors that have been influencing and creating deep changes in the Portuguese banking sector. Among these, we can highlight technological innovation, the increa...
Fernando Alberto Freitas Ferreira, Nuno Sidó...
LISA
2003
13 years 11 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
13 years 11 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith