"We have put together a set of guidelines that have served us well as developers and consultants over the years, and we offer these as suggestions that may help you in your job."
they automatically delete the object pointed to at the appropriate time. Smart pointers are particularly useful in the face of exceptions as they ensure proper destruction of dynamically allocated objects. They can also be used to keep track of dynamicall
Any peer-to-peer publishing system must provide a mechanism for efficiently locating published documents. For censorship resistant systems, it is particularly important that the lookup mechanism be difficult to disable or abuse.
simple extension to email that lets you append your entire address book to outgoing mail message without compromising your privacy. Correspondents can use this information to prioritize their mail, and learn more about their social networks.
Li Fan, Pei Cao and Jussara Almeida & Andrei Z. Broder - this new protocol, each proxy keeps a summary of the cache directory of each participating proxy, and checks these summaries for potential hits before sending any queries.
M. Marschollek, K. Wolf, O. Bott, M. Geisler, M. Plischke, W. Ludwig, A. Hornberger, und R. Haux. Proceedings of the 12th World Congress on Health (Medical) Informatics
-- Building Sustainable Health Systems. MEDINFO2007, 20.-24.08.2007,
Brisbane, Australia, Volume 129 von Stud Health Technol Inform, Seite 8--12. Amsterdam, IOS Press, (August 2007)
E. Schwarzkopf, M. Bauer, und D. Dengler. Proceedings of the 7th international conference on Intelligent user interfaces, Seite 220--221. New York, NY, USA, ACM, (2002)
E. Schwarzkopf, M. Bauer, und D. Dengler. Proceedings of the 8th international conference on Intelligent user interfaces, Seite 287--289. New York, NY, USA, ACM, (2003)