Sciweavers

2752 search results - page 354 / 551
» Application performance in the QLinux multimedia operating s...
Sort
View
SISW
2005
IEEE
15 years 4 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
MOBIHOC
2004
ACM
15 years 10 months ago
Error characteristics of ad hoc positioning systems (aps)
APS algorithms use the basic idea of distance vector routing to find positions in an ad hoc network using only a fraction of landmarks, for example GPS enabled nodes. All the node...
Dragos Niculescu, Badri Nath
SKG
2005
IEEE
15 years 4 months ago
Effective Maintenance of Materialized Views in Peer Data Management Systems
Materialized view is a useful tool to cache data in data warehouse, data replication, data visualization and etc. However, view maintenance in peer data management systems (PDMSs) ...
Biao Qin, Shan Wang, Xiaoyong Du
USS
2008
15 years 1 months ago
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software
Remote error analysis aims at timely detection and remedy of software vulnerabilities through analyzing runtime errors that occur on the client. This objective can only be achieve...
Rui Wang 0010, XiaoFeng Wang, Zhuowei Li
MM
2003
ACM
161views Multimedia» more  MM 2003»
15 years 4 months ago
Integrated power management for video streaming to mobile handheld devices
Optimizing user experience for streaming video applications on handheld devices is a significant research challenge. In this paper, we propose an integrated power management appr...
Shivajit Mohapatra, Radu Cornea, Nikil D. Dutt, Al...