Sciweavers

2199 search results - page 391 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
104
Voted
P2P
2003
IEEE
110views Communications» more  P2P 2003»
15 years 5 months ago
The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems
In this paper, we take an availability-centric view on quality of service (QoS) and propose a model and mechanisms for studying the effectiveness of realistic replication schemes ...
Giwon On, Jens Schmitt, Ralf Steinmetz
114
Voted
MOBISYS
2008
ACM
16 years 4 days ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
109
Voted
SAC
2009
ACM
15 years 7 months ago
Using geo-spatial session tagging for smart multicast session discovery
IP multicast is increasingly seen as efficient mode of live content distribution in the Internet to significantly large subscriber bases. Despite its numerous benefits over IP u...
Piyush Harsh, Richard Newman
89
Voted
ICIP
2003
IEEE
16 years 2 months ago
Prescient R-D optimized packet dependency management for low-latency video streaming
We present an improved, prescient, scheme to deliver pre-encoded video streams at very low latency. We dynamically manage the prediction dependency for a group of packets using a ...
Yi J. Liang, Bernd Girod
84
Voted
ICPR
2008
IEEE
16 years 1 months ago
Layered object categorization
In this paper, we propose a novel framework of object categorization, namely layered object categorization, which takes advantage of hierarchical category information and performs...
Hong Cheng, Jie Yang, Lei Yang, Nanning Zheng