Sciweavers

1559 search results - page 286 / 312
» Heuristic Approaches to Energy-Efficient Network Design Prob...
Sort
View
DSN
2005
IEEE
15 years 4 months ago
Checking Array Bound Violation Using Segmentation Hardware
The ability to check memory references against their associated array/buffer bounds helps programmers to detect programming errors involving address overruns early on and thus avo...
Lap-Chung Lam, Tzi-cker Chiueh
EMO
2009
Springer
140views Optimization» more  EMO 2009»
15 years 3 months ago
On Using Populations of Sets in Multiobjective Optimization
Abstract. Most existing evolutionary approaches to multiobjective optimization aim at finding an appropriate set of compromise solutions, ideally a subset of the Pareto-optimal se...
Johannes Bader, Dimo Brockhoff, Samuel Welten, Eck...
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 4 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
ICWE
2004
Springer
15 years 4 months ago
Loosely Coupled Web Services in Remote Object Federations
Abstract Loosely coupled services are gaining importance in many business domains. However, compared to OO-RPC middleware approaches, emerging technologies proposed to implement lo...
Uwe Zdun
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 4 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen