Sciweavers

1205 search results - page 183 / 241
» From high-level component-based models to distributed implem...
Sort
View
122
Voted
ICC
2008
IEEE
138views Communications» more  ICC 2008»
15 years 7 months ago
Designing File Replication Schemes for Peer-to-Peer File Sharing Systems
—Peer-to-peer (P2P) file sharing systems are becoming increasingly popular due to their flexibility and scalability. We propose a new model to design file replication schemes ...
Jian Ni, Jie Lin, S. J. Harrington, Naveen Sharma
RE
1999
Springer
15 years 4 months ago
Bridging the Gap Between Past and Future in RE: A Scenario-Based Approach
Requirements Engineering (RE) investigates the impact of a future-oriented change vision, but the move towards this vision must consider a context heavily shaped by the past. As R...
Peter Haumer, Matthias Jarke, Klaus Pohl, Patrick ...
95
Voted
ECCV
2010
Springer
15 years 3 months ago
Anomalous Behaviour Detection using Spatiotemporal Oriented Energies, Subset Inclusion Histogram Comparison and Event-Driven Pro
Abstract. This paper proposes a novel approach to anomalous behaviour detection in video. The approach is comprised of three key components. First, distributions of spatiotemporal ...
NSDI
2008
15 years 2 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
CORR
2010
Springer
173views Education» more  CORR 2010»
14 years 11 months ago
An Approach to Ad hoc Cloud Computing
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provi...
Graham N. C. Kirby, Alan Dearle, Angus Macdonald, ...