Sciweavers

4323 search results - page 299 / 865
» Callback Implementations in C
Sort
View
MIDDLEWARE
2007
Springer
15 years 11 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
W2GIS
2007
Springer
15 years 10 months ago
XFormsGI - Extending XForms for Geospatial and Sensor Data
User interaction is mostly based on forms. However, forms are restricted to alphanumerical data – the editing of geospatial data is not supported. This statement does not only ho...
Jürgen Weitkämper, Thomas Brinkhoff
ICMCS
2006
IEEE
144views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A Novel Two-Stage Rate Control Scheme for H.264
— A new rate control algorithm for the H.264 encoder is developed in this work. There are several unique features in the proposed rate control scheme. First, a two-stage encoding...
Do-Kyoung Kwon, Mei-Yin Shen, C. C. Jay Kuo
INFOCOM
2006
IEEE
15 years 10 months ago
Stimulating Participation in Wireless Community Networks
—Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. We focus on the provision of Internet access to mobile users ...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
IPPS
2006
IEEE
15 years 10 months ago
Recent advances in checkpoint/recovery systems
Checkpoint and Recovery (CPR) systems have many uses in high-performance computing. Because of this, many developers have implemented it, by hand, into their applications. One of ...
Greg Bronevetsky, Rohit Fernandes, Daniel Marques,...