Sciweavers

2722 search results - page 402 / 545
» Hastily formed networks
Sort
View
116
Voted
SIGOPS
2010
130views more  SIGOPS 2010»
14 years 11 months ago
Storing and accessing live mashup content in the cloud
Today’s Rich Internet Application (RIA) technologies such as Ajax, Flex, or Silverlight, are designed around the client-server paradigm and cannot easily take advantage of repli...
Krzysztof Ostrowski, Ken Birman
TCSB
2010
14 years 11 months ago
Biomodel Engineering - From Structure to Behavior
Biomodel engineering is the science of designing, constructing and analyzing computational models of biological systems. It forms a systematic and powerful extension of earlier mat...
Rainer Breitling, Robin Donaldson, David R. Gilber...
TDSC
2010
218views more  TDSC 2010»
14 years 11 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
VTC
2010
IEEE
153views Communications» more  VTC 2010»
14 years 11 months ago
H.264 Wireless Video Telephony Using Iteratively-Detected Binary Self-Concatenated Coding
— In this contribution we propose a robust H.264 coded wireless video transmission scheme using iteratively decoded self-concatenated convolutional coding (SECCC). The proposed S...
Nasruminallah, Muhammad Fasih Uddin Butt, Soon Xin...
163
Voted
ISW
2010
Springer
14 years 10 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang