Sciweavers

13841 search results - page 2566 / 2769
» Algorithms and Constraint Programming
Sort
View
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
15 years 9 months ago
Composable Language Extensions for Computational Geometry: A Case Study
— This paper demonstrates how two different sets of powerful domain specific language features can be specified and deployed as composable language extensions. These extensions...
Eric Van Wyk, Eric Johnson
134
Voted
ICC
2007
IEEE
15 years 9 months ago
Inter-Domain QoS Routing with Virtual Trunks
— This paper addresses the problem of inter-domain QoS routing. We propose a solution based on virtual-trunk type aggregates corresponding to Service Level Agreements (SLA) for d...
Rui Prior, Susana Sargento
113
Voted
ICMCS
2007
IEEE
120views Multimedia» more  ICMCS 2007»
15 years 9 months ago
Optimal Scheduling of Media Packets with Multiple Distortion Measures
Due to the increase in diversity of wireless devices, streaming media systems must be capable of serving multiple types of users. Scalable coding allows for adaptations without re...
Carri W. Chan, Nicholas Bambos, Susie Wee, John G....
136
Voted
ICMCS
2007
IEEE
175views Multimedia» more  ICMCS 2007»
15 years 9 months ago
Clicker - An IPTV Remote Control in Your Cell Phone
This paper investigates a novel concept of providing seamless control and portability of an IPTV viewing session. A solution employing a middleware system, a secure hardware token...
Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yenn...
IPCCC
2007
IEEE
15 years 9 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
« Prev « First page 2566 / 2769 Last » Next »