Sciweavers

1116 search results - page 198 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
VLC
2008
132views more  VLC 2008»
15 years 10 days ago
Enforced generative patterns for the specification of the syntax and semantics of visual languages
We present the new notion of enforced generative pattern, a structure that declares positive or negative conditions that must be satisfied by a model. Patterns are applied to tran...
Paolo Bottoni, Esther Guerra, Juan de Lara
89
Voted
MMS
2002
15 years 4 days ago
An adaptive video multicast scheme for varying workloads
Periodic broadcast and scheduled multicast have been shown to be very effective in reducing the demand on server bandwidth. While periodic broadcast is better for popular videos, s...
Kien A. Hua, Jung-Hwan Oh, Khanh Vu
125
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
Maintaining Approximate Minimum Steiner Tree and k-center for Mobile Agents in a Sensor Network
Abstract--We study the problem of maintaining group communication between m mobile agents, tracked and helped by n static networked sensors. We develop algorithms to maintain a O(l...
Dengpan Zhou, Jie Gao
91
Voted
MICRO
2010
IEEE
119views Hardware» more  MICRO 2010»
14 years 10 months ago
A Predictive Model for Dynamic Microarchitectural Adaptivity Control
Abstract--Adaptive microarchitectures are a promising solution for designing high-performance, power-efficient microprocessors. They offer the ability to tailor computational resou...
Christophe Dubach, Timothy M. Jones, Edwin V. Boni...
117
Voted
ESORICS
2011
Springer
14 years 6 days ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...