Sciweavers

26496 search results - page 5135 / 5300
» An Approach to Computing Ethics
Sort
View
CGO
2007
IEEE
15 years 4 months ago
Persistent Code Caching: Exploiting Code Reuse Across Executions and Applications
Run-time compilation systems are challenged with the task of translating a program’s instruction stream while maintaining low overhead. While software managed code caches are ut...
Vijay Janapa Reddi, Dan Connors, Robert Cohn, Mich...
CSFW
2007
IEEE
15 years 4 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
ICC
2007
IEEE
214views Communications» more  ICC 2007»
15 years 4 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 4 months ago
A Two-Layer Characteristic-based Rate Control Framework for Low Delay Video Transmission
— In this paper, we present a two-layer rate control In [4], their rate controller TMN8 applied the Lagrange framework for low delay video transmission based on a multiplier to d...
Chun-Yuan Chang, Ming-Hung Chen, Cheng-Fu Chou, Di...
ICC
2007
IEEE
15 years 4 months ago
Adaptive Beam Clustering Optical Wireless System for An Indoor Channel
: The separating distance between the transceivers is one of the main factors that affect the quality of the received optical signal as the receiver changes locations in an optical...
Jamal M. Alattar, Jaafar M. H. Elmirghani
« Prev « First page 5135 / 5300 Last » Next »