-
1
-
-
47649086453
-
-
3MS consortium, February 2007.
-
3MS consortium, February 2007.
-
-
-
-
2
-
-
47649093141
-
-
3MS consortium, February 2007.
-
3MS consortium, February 2007.
-
-
-
-
3
-
-
33750110668
-
Toward Pervasive Computing
-
J. Bacon. Toward Pervasive Computing. IEEE Perv., 1(2):84-86, 2002.
-
(2002)
IEEE Perv
, vol.1
, Issue.2
, pp. 84-86
-
-
Bacon, J.1
-
4
-
-
33847675361
-
Businessfinder: Harnessing presence to enable live yellow pages for small, medium and micro mobile businesses
-
Jan
-
D. Chakraborty, K. Dasgupta, S. Mittal, A. Misra, A. Gupta, E. Newmark, and C. Oberle. Businessfinder: harnessing presence to enable live yellow pages for small, medium and micro mobile businesses. IEEE Comm., 45(1):144-151, Jan. 2007.
-
(2007)
IEEE Comm
, vol.45
, Issue.1
, pp. 144-151
-
-
Chakraborty, D.1
Dasgupta, K.2
Mittal, S.3
Misra, A.4
Gupta, A.5
Newmark, E.6
Oberle, C.7
-
5
-
-
0033154298
-
A distributed architecture for multiplayer interactive applications on the internet
-
C. Diot and L. Gautier. A distributed architecture for multiplayer interactive applications on the internet. IEEE Network, 13(4):6-15, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.4
, pp. 6-15
-
-
Diot, C.1
Gautier, L.2
-
6
-
-
47649110330
-
-
3MS consortium, February 2007.
-
3MS consortium, February 2007.
-
-
-
-
7
-
-
24944483574
-
The Inlined Reference Monitor Approach to Security Policy Enforcement
-
Technical report 2003-1916, Department of Computer Science, Cornell University
-
U. Erlingsson. The Inlined Reference Monitor Approach to Security Policy Enforcement. Technical report 2003-1916, Department of Computer Science, Cornell University, 2003.
-
(2003)
-
-
Erlingsson, U.1
-
8
-
-
0033724116
-
IRM Enforcement of Java Stack Inspection
-
Washington, DC, USA
-
U. Erlingsson and F. B. Schneider. IRM Enforcement of Java Stack Inspection. In Proc. of IEEE SS&P'00, Washington, DC, USA, 2000.
-
(2000)
Proc. of IEEE SS&P'00
-
-
Erlingsson, U.1
Schneider, F.B.2
-
10
-
-
0036499278
-
The Anatomy of a Context-Aware Application
-
8(2, 3):187-197
-
A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster. The Anatomy of a Context-Aware Application. WiNet, 8(2 - 3):187-197, 2002.
-
(2002)
WiNet
-
-
Harter, A.1
Hopper, A.2
Steggles, P.3
Ward, A.4
Webster, P.5
-
12
-
-
33745202945
-
Online gaming demands heavyweight data centers
-
July
-
D. Kushner. Online gaming demands heavyweight data centers. IEEE Spectrum, 42(7):34-39, July 2005.
-
(2005)
IEEE Spectrum
, vol.42
, Issue.7
, pp. 34-39
-
-
Kushner, D.1
-
14
-
-
0037051773
-
Bytecode verification on java smart cards
-
X. Leroy. Bytecode verification on java smart cards. Softw. Pract. Exper., 32(4):319-340, 2002.
-
(2002)
Softw. Pract. Exper
, vol.32
, Issue.4
, pp. 319-340
-
-
Leroy, X.1
-
15
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Feb
-
J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. IJIS, 4(1-2):2-16, Feb. 2005.
-
(2005)
IJIS
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
16
-
-
20344386262
-
Peer-to-peer architecture and protocol for a massively multiplayer online game
-
Dallas, TX, 29 Nov.-3 Dec, IEEE
-
M. Merabti and A. E. Rhalibi. Peer-to-peer architecture and protocol for a massively multiplayer online game. In Proc. of GLOBECOM'04, pages 519-528, Dallas, TX, 2004, 29 Nov.-3 Dec. 2004. IEEE.
-
(2004)
Proc. of GLOBECOM'04
, pp. 519-528
-
-
Merabti, M.1
Rhalibi, A.E.2
-
17
-
-
0001800257
-
Safe, untrusted agents using proof-carrying code
-
Springer-Verlag, London, UK
-
G. C. Necula and P. Lee. Safe, untrusted agents using proof-carrying code. In Mobile Agents and Security, pages 61-91. Springer-Verlag, London, UK, 1998.
-
(1998)
Mobile Agents and Security
, pp. 61-91
-
-
Necula, G.C.1
Lee, P.2
-
18
-
-
21644473233
-
NET Security: Lessons Learned and Missed from Java
-
N. Paul and D. Evans. .NET Security: Lessons Learned and Missed from Java. In Proc. of ACSAC'04, 2004.
-
(2004)
Proc. of ACSAC'04
-
-
Paul, N.1
Evans, D.2
-
19
-
-
33745452062
-
The Psychology of MMORPGs: Emotional Investment, Motivations, Relationship Formation, and Problematic Usage
-
R. Schroeder and A. Axelsson, editors, London, Springer-Verlag
-
N. Yee. The Psychology of MMORPGs: Emotional Investment, Motivations, Relationship Formation, and Problematic Usage. In R. Schroeder and A. Axelsson, editors, Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments, London, 2005. Springer-Verlag.
-
(2005)
Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments
-
-
Yee, N.1
|