Sciweavers

490 search results - page 91 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
TIT
2002
78views more  TIT 2002»
14 years 9 months ago
Communicating via a processing broadcast satellite
Three dependent users are physically separated but communicate with each other via a satellite. Each user generates data which it stores locally. In addition, each user sends a me...
Aaron D. Wyner, Jack K. Wolf, Frans M. J. Willems
WIOPT
2010
IEEE
14 years 8 months ago
Lifetime optimization for wireless sensor networks with correlated data gathering
—The nodes in wireless sensor networks often collect correlated measurements. Not taking into account this information redundancy is detrimental to the network lifetime, since co...
Nashat Abughalieh, Yann-Aël Le Borgne, Kris S...
90
Voted
ICSE
2010
IEEE-ACM
14 years 7 months ago
Syde: a tool for collaborative software development
Team collaboration is essential for the success of multi-developer projects. When team members are spread across different locations, individual awareness of the activity of other...
Lile Hattori, Michele Lanza
ASPLOS
2009
ACM
15 years 10 months ago
ASSURE: automatic software self-healing using rescue points
Software failures in server applications are a significant problem for preserving system availability. We present ASSURE, a system that introduces rescue points that recover softw...
Stelios Sidiroglou, Oren Laadan, Carlos Perez, Nic...
VEE
2006
ACM
126views Virtualization» more  VEE 2006»
15 years 3 months ago
A new approach to real-time checkpointing
The progress towards programming methodologies that simplify the work of the programmer involves automating, whenever possible, activities that are secondary to the main task of d...
Antonio Cunei, Jan Vitek