Sciweavers

2503 search results - page 416 / 501
» Building Computer Network Attacks
Sort
View
PERCOM
2006
ACM
16 years 1 months ago
Analysing fundamental properties of marker-based vision system designs
This paper investigates fundamental properties of Marker-based Vision (MBV) systems. We present a theoretical analysis of the performance of basic tag designs which is extended th...
Andrew C. Rice, Robert K. Harle, Alastair R. Beres...
PERCOM
2006
ACM
16 years 1 months ago
Cantag: an open source software toolkit for designing and deploying marker-based vision systems
This paper presents Cantag, an open source software toolkit for building Marker-based Vision (MBV) systems that can identify and accurately locate printed markers in three dimensi...
Andrew C. Rice, Alastair R. Beresford, Robert K. H...
113
Voted
DCC
2004
IEEE
16 years 1 months ago
Rate-Distortion Optimized Slicing, Packetization and Coding for Error Resilient Video Transmission
This paper presents an algorithm to optimize the tradeoff between rate and expected end-to-end distortion of a video sequence transmitted over a packet network. The approach optim...
Enrico Masala, Hua Yang, Kenneth Rose, Juan Carlos...
DSN
2009
IEEE
15 years 8 months ago
Dynamic content web applications: Crash, failover, and recovery analysis
This work assesses how crashes and recoveries affect the performance of a replicated dynamic content web application. RobustStore is the result of retrofitting TPC-W’s on-line ...
Luiz Eduardo Buzato, Gustavo M. D. Vieira, Willy Z...
POLICY
2009
Springer
15 years 8 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...