Sciweavers

1587 search results - page 139 / 318
» Access Control for Shared Resources
Sort
View
CCS
2010
ACM
15 years 28 days ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
ICVS
2003
Springer
15 years 6 months ago
Efficient Fingertip Tracking and Mouse Pointer Control for a Human Mouse
This paper discusses the design of a working system that visually recognizes hand gestures for the control of a window based user interface. We present a method for tracking the fi...
Jiyoung Park, Juneho Yi
ASPDAC
2006
ACM
119views Hardware» more  ASPDAC 2006»
15 years 6 months ago
Using speculative computation and parallelizing techniques to improve scheduling of control based designs
Recent research results have seen the application of parallelizing techniques to high-level synthesis. In particular, the effect of speculative code transformations on mixed contr...
Roberto Cordone, Fabrizio Ferrandi, Marco D. Santa...
113
Voted
PERCOM
2008
ACM
16 years 9 days ago
MyNet: A Platform for Secure P2P Personal and Social Networking Services
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
109
Voted
GECCO
2007
Springer
196views Optimization» more  GECCO 2007»
15 years 6 months ago
Optimal nesting of species for exact cover of resources: two against many
The application of resource-defined fitness sharing (RFS) to shape nesting problems reveals a remarkable ability to discover tilings [7, 8]. These tilings represent exact covers...
Jeffrey Horn