Sciweavers

2516 search results - page 409 / 504
» Integrity Constraints for XML
Sort
View
WOWMOM
2009
ACM
157views Multimedia» more  WOWMOM 2009»
15 years 4 months ago
The CHIANTI architecture for robust mobile Internet access
The quality of Internet access for mobile users may suffer from highly variable communication characteristics (packet loss, delay, throughput) and from temporary disconnections. T...
Jörg Ott, Petri Ylikoski, Nils Seifert, Caleb...
AFRICACRYPT
2010
Springer
15 years 4 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
DATE
2008
IEEE
85views Hardware» more  DATE 2008»
15 years 4 months ago
Video Processing Requirements on SoC Infrastructures
Applications from the embedded consumer domain put challenging requirements on SoC infrastructures, i.e. interconnect and memory. Specifically, video applications demand large sto...
Pieter van der Wolf, Tomas Henriksson
DSRT
2008
IEEE
15 years 4 months ago
A Dynamic Area of Interest Management and Collaboration Model for P2P MMOGs
In this paper, we present a dynamic area of interest management for Massively Multiplayer Online Games (MMOG). Instead of mapping the virtual space to the area of interest (AOI), ...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
HASE
2008
IEEE
15 years 4 months ago
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination
For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
Debmalya Biswas, Thomas Gazagnaire, Blaise Genest