Sciweavers

1414 search results - page 121 / 283
» Cover Time and Broadcast Time
Sort
View
119
Voted
ICIP
2004
IEEE
16 years 2 months ago
Sharing video annotations
This paper describes an approach for locating annotations generated in one video and properly placing them in a second, modified version of the same video. We focus on modificatio...
Yaron Caspi, David Bargeron
MOBISYS
2005
ACM
16 years 12 days ago
Slingshot: deploying stateful services in wireless hotspots
Given a sufficiently good network connection, even a handheld computer can run extremely resource-intensive applications by executing the demanding portions on a remote server. At...
Ya-Yunn Su, Jason Flinn
70
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Scalability and Peer Churning in IP-TV: An Analytical Insight
— Peer-to-peer (P2P) technology for TV broadcasting over the Internet is becoming more and more popular in the very last years. This paper introduces a network-wide efficiency m...
Maria Luisa Merani, G. P. Leonardi, D. Saladino
75
Voted
DATE
2007
IEEE
81views Hardware» more  DATE 2007»
15 years 7 months ago
Using the inter- and intra-switch regularity in NoC switch testing
This paper proposes an efficient test methodology to test switches in a Network-on-Chip (NoC) architecture. A switch in an NoC consists of a number of ports and a router. Using th...
Mohammad Hosseinabady, Atefe Dalirsani, Zainalabed...
CRYPTO
2004
Springer
91views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
Non-interactive Timestamping in the Bounded Storage Model
A timestamping scheme is non-interactive if a stamper can stamp a document without communicating with any other player. The only communication done is at validation time. Non-Inte...
Tal Moran, Ronen Shaltiel, Amnon Ta-Shma