Sciweavers

2648 search results - page 334 / 530
» Challenges for Network Computer Games
Sort
View
DSN
2005
IEEE
15 years 10 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
IPPS
2005
IEEE
15 years 10 months ago
Maximizing the Lifetime of Dominating Sets
We investigate the problem of maximizing the lifetime of wireless ad hoc and sensor networks. Being battery powered, nodes in such networks have to perform their intended task und...
Thomas Moscibroda, Roger Wattenhofer
AP2PS
2009
IEEE
15 years 9 months ago
A Highly Robust P2P-CDN under Large-Scale and Dynamic Participation
—By building a P2P Content Distribution Network (CDN), peers collaborate to distribute the content of underprovisionned websites and to serve queries for larger audiences on beha...
Manal El Dick, Esther Pacitti, Bettina Kemme
NOSSDAV
2010
Springer
15 years 9 months ago
TSync: a new synchronization framework for multi-site 3D tele-immersion
Synchronization is a challenge in the multi-site 3D teleimmersion (3DTI) because it is complicated by the coexistence of highly correlated heterogenous streams from multiple sourc...
Zixia Huang, Wanmin Wu, Klara Nahrstedt, Md. Ahsan...
ICNP
1998
IEEE
15 years 8 months ago
Improving Wireless LAN Performance via Adaptive Local Error Control
Wireless links can exhibit high error rates due to attenuation, fading, or interfering active radiation sources. To make matters worse, error rates can be highly variable due to c...
David A. Eckhardt, Peter Steenkiste