Sciweavers

369 search results - page 32 / 74
» A Distributed Opportunistic Access Scheme for OFDMA Systems
Sort
View
ICMCS
2006
IEEE
115views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Scalable Image Retrieval from Distributed Images Database
In order to store, and retrieve images from large databases, we propose a framework, based on multiple description coding paradigm, that disseminates images over distributed serve...
Tammam Tillo, Marco Grangetto, Gabriella Olmo
P2P
2006
IEEE
130views Communications» more  P2P 2006»
15 years 5 months ago
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
CCGRID
2011
IEEE
14 years 3 months ago
Improving Utilization of Infrastructure Clouds
— A key advantage of Infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either...
Paul Marshall, Kate Keahey, Timothy Freeman
NSDI
2010
15 years 1 months ago
EndRE: An End-System Redundancy Elimination Service for Enterprises
In many enterprises today, WAN optimizers are being deployed in order to eliminate redundancy in network traffic and reduce WAN access costs. In this paper, we present the design ...
Bhavish Agarwal, Aditya Akella, Ashok Anand, Athul...
CCS
2009
ACM
16 years 10 days ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong