Sciweavers

694 search results - page 59 / 139
» Achieving and assuring high availability
Sort
View
TIP
2002
94views more  TIP 2002»
14 years 9 months ago
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
Watermarkingwith both obliviousdetection and high robustness capabilities is still a challenging problem. The existing methods are either robust or oblivious, but it is di cult to...
Chun-Shien Lu, Hong-Yuan Mark Liao, Martin Kutter
HIPEAC
2011
Springer
13 years 9 months ago
A workload-aware mapping approach for data-parallel programs
Much compiler-orientated work in the area of mapping parallel programs to parallel architectures has ignored the issue of external workload. Given that the majority of platforms w...
Dominik Grewe, Zheng Wang, Michael F. P. O'Boyle
PERCOM
2007
ACM
15 years 9 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
AINA
2007
IEEE
15 years 4 months ago
Pervasive Service Composition in the Home Network
The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definiti...
André Bottaro, Anne Gérodolle, Phili...
INFOCOM
2007
IEEE
15 years 4 months ago
Dynamic Cross-Layer Association in 802.11-Based Mesh Networks
—In IEEE 802.11-based wireless mesh networks a user is associated with an access point (AP) in order to communicate and be part of the overall network. The association mechanism ...
George Athanasiou, Thanasis Korakis, Özgü...