Sciweavers

2024 search results - page 295 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
144
Voted
ICMCS
2006
IEEE
144views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Receiver-Based Optimization for Video Delivery Over Wireless Links
We consider transfer of video frames over a time-varying wireless channel. When the channel is good, the transmitter can send frames at a higher rate than the receiver can consume...
Carri W. Chan, John G. Apostolopoulos, Yan Li, Nic...
143
Voted
ATAL
2005
Springer
15 years 9 months ago
T-Man: Gossip-Based Overlay Topology Management
Overlay topology plays an important role in P2P systems. Topology serves as a basis for achieving functions such as routing, searching and information dissemination, and it has a m...
Márk Jelasity, Özalp Babaoglu
136
Voted
PDP
2002
IEEE
15 years 8 months ago
A Fault-Tolerant Reservation-Based Strategy for Scheduling Aperiodic Tasks in Multiprocessor Systems
Periodic and aperiodic tasks co-exist in many realtime systems. The periodic tasks typically arise from sensor data or control loops, while the aperiodic tasks generally arise fro...
Chun-Hua Yang, Geert Deconinck
142
Voted
TCAD
2008
103views more  TCAD 2008»
15 years 3 months ago
Topology-Based Performance Analysis and Optimization of Latency-Insensitive Systems
Latency-insensitive protocols allow system-on-chip (SoC) engineers to decouple the design of the computing cores from the design of the intercore communication channels while follo...
Rebecca L. Collins, Luca P. Carloni
162
Voted
CCS
2011
ACM
14 years 3 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...