Sciweavers

6960 search results - page 1245 / 1392
» Continuity Analysis of Programs
Sort
View
MM
2009
ACM
163views Multimedia» more  MM 2009»
15 years 9 months ago
Peer-assisted packet loss repair for IPTV video multicast
Emerging IPTV technology uses source-specific IP multicast to deliver TV programs to the end-users. To provide timely and reliable services over the error-prone DSL access networ...
Zhi Li, Xiaoqing Zhu, Ali C. Begen, Bernd Girod
121
Voted
CSMR
2008
IEEE
15 years 9 months ago
Package Reference Fingerprint: a Rich and Compact Visualization to Understand Package Relationships
Object-oriented languages such as Java, Smalltalk, and C++ structure their programs using packages, allowing classes to be organized into named abstractions. Maintainers of large ...
Hani Abdeen, Ilham Alloui, Stéphane Ducasse...
ETFA
2008
IEEE
15 years 9 months ago
Evaluation of Sequential Function Charts execution techniques. The Active Steps Algorithm
Programmable Logic Controllers (PLCs) play a significant role in the control of production systems and Sequential Function Chart (SFC) is one of the main programming languages. Th...
Ramon Piedrafita Moreno, José Luis Villarro...
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 9 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
136
Voted
IEEEPACT
2008
IEEE
15 years 9 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
« Prev « First page 1245 / 1392 Last » Next »