Sciweavers

571 search results - page 68 / 115
» From Control Flow to Dataflow
Sort
View
ICIP
2003
IEEE
16 years 1 months ago
Rate-distortion optimized on-demand media streaming with server diversity
This paper studies the streaming of packetized media from multiple servers to a client over a lossy network. In particular, we propose a client-driven rate-distortion optimal pack...
Ali C. Begen, Yucel Altunbasak, Mehmet A. Begen
FC
1998
Springer
83views Cryptology» more  FC 1998»
15 years 4 months ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
AI50
2006
15 years 3 months ago
Development Via Information Self-structuring of Sensorimotor Experience and Interaction
actvoid.se Abstract. We describe how current work in Artificial Intelligence is using rigorous tools from information theory, namely information distance and experience distance to...
Chrystopher L. Nehaniv, Naeem Assif Mirza, Lars Ol...
POPL
2009
ACM
16 years 13 days ago
The theory of deadlock avoidance via discrete control
Deadlock in multithreaded programs is an increasingly important problem as ubiquitous multicore architectures force parallelization upon an ever wider range of software. This pape...
Manjunath Kudlur, Scott A. Mahlke, Stéphane...
SACMAT
2009
ACM
15 years 6 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang