Sciweavers

42388 search results - page 8295 / 8478
» Classification Using Information
Sort
View
121
Voted
IPPS
2005
IEEE
15 years 8 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
ISCAS
2005
IEEE
142views Hardware» more  ISCAS 2005»
15 years 8 months ago
Fast region-of-interest transcoding for JPEG 2000 images
This paper presents a newly developed region-on-interest (ROI) transcoding method for JPEG 2000 images, which can be used for many progressive image/video streaming applications. ...
Hao-Song Kong, Anthony Vetro, Toshihiko Hata, Naok...
ISCC
2005
IEEE
101views Communications» more  ISCC 2005»
15 years 8 months ago
Comparing and Evaluating Lightweight Solutions for Replica Dissemination and Retrieval in Dense MANETs
There is an emerging market interest in service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, such as shopping malls, airports, and unive...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
IWPSE
2005
IEEE
15 years 8 months ago
EvoLens: Lens-View Visualizations of Evolution Data
Visualizing software evolution is essential for identifying design erosions that have occurred over the past releases. Making evolutionary aspects explicit via visual representati...
Jacek Ratzinger, Michael Fischer, Harald Gall
QEST
2005
IEEE
15 years 8 months ago
Workload Propagation - Overload in Bursty Servers
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Qi Zhang, Alma Riska, Erik Riedel
« Prev « First page 8295 / 8478 Last » Next »