Sciweavers

7607 search results - page 1468 / 1522
» informs 2006
Sort
View
VEE
2006
ACM
115views Virtualization» more  VEE 2006»
14 years 2 months ago
Live updating operating systems using virtualization
Many critical IT infrastructures require non-disruptive operations. However, the operating systems thereon are far from perfect that patches and upgrades are frequently applied, i...
Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, ...
VRST
2006
ACM
14 years 2 months ago
Hand-held virtual reality: a feasibility study
Hand-held computing devices are ubiquitous and have become part of our lives these days. Moreover, hand-held devices are also increasingly being equipped with special sensors and ...
Jane Hwang, Jaehoon Jung, Gerard Jounghyun Kim
W4A
2006
ACM
14 years 2 months ago
How people use presentation to search for a link: expanding the understanding of accessibility on the web
It is well known that many Web pages are difficult for visually disabled people to use. Without access to a rich, visual display, the intended structure and organisation of the pa...
Caroline Jay, Robert Stevens, Mashhuda Glencross, ...
WOWMOM
2006
ACM
109views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
A Flow Control Framework for Improving Throughput and Energy Efficiency in CSMA/CA based Wireless Multihop Networks
— In multihop wireless networks where a random access MAC scheme such as CSMA/CA is used, nodes greedily compete in a distributed manner and are unaware of the interference they ...
Jaya Shankar Pathmasuntharam, Amitabha Das, Prasan...
WPES
2006
ACM
14 years 2 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
« Prev « First page 1468 / 1522 Last » Next »