Sciweavers

5866 search results - page 986 / 1174
» Designing Accelerator-Based Distributed Systems for High Per...
Sort
View
148
Voted
ISSRE
2008
IEEE
15 years 10 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
120
Voted
IPCCC
2007
IEEE
15 years 9 months ago
First Responders' Crystal Ball: How to Scry the Emergency from a Remote Vehicle
Successes and failures during rescue operations after hurricane Katrina and the Twin Towers attack demonstrated the importance of supporting first responders with adequate means t...
Marco Roccetti, Mario Gerla, Claudio E. Palazzi, S...
161
Voted
ICMCS
2005
IEEE
113views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Network-Adaptive Frame-Expansion-Based Packet Video Coding for Erasure Channels
This paper proposes a novel error-resilient packet video coding method which is designed to operate on unreliable IP networks suffering from large bursts of packet losses. The mai...
Andrew G. Backhouse, Irene Y. H. Gu
128
Voted
SIGECOM
2005
ACM
113views ECommerce» more  SIGECOM 2005»
15 years 9 months ago
Dynamic and secure B2B e-contract update management
Business-to-business electronic contracts provide a specification of the agreed value exchange and guarantee legal protection to companies during electronic trading relations. Imp...
Samuil Angelov, Sven Till, Paul W. P. J. Grefen
116
Voted
CASES
2003
ACM
15 years 8 months ago
Reducing code size with echo instructions
In an embedded system, the cost of storing a program onchip can be as high as the cost of a microprocessor. Compressing an application’s code to reduce the amount of memory requ...
Jeremy Lau, Stefan Schoenmackers, Timothy Sherwood...