Sciweavers

2655 search results - page 219 / 531
» LT Network Codes
Sort
View
104
Voted
AINA
2007
IEEE
15 years 7 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
126
Voted
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Error Resilient Multiple Description Compression of Vector Graphics
This research is motivated by the needs of robust streaming of vector graphics contents over the Internet, wireless and other lossy networks. We present a multiple description cod...
Martin Röder, Xiaolin Wu, Sorina Dumitrescu
117
Voted
IPSN
2004
Springer
15 years 6 months ago
How to distribute sensors in a random field?
In this paper, we study the optimal way of distributing sensors in a random field to minimize the estimation distortion. We show that this problem is equivalent to certain proble...
Xin Zhang, Stephen B. Wicker
IPPS
2000
IEEE
15 years 5 months ago
Broadcasting in Hypercubes in the Circuit Switched Model
In this paper, we propose a method which enables us to construct almost optimal broadcast schemes on an n-dimensional hypercube in the circuit switched, -port model. In this mode...
Jean-Claude Bermond, Takako Kodate, Stephane Peren...
107
Voted
CASCON
1997
97views Education» more  CASCON 1997»
15 years 2 months ago
Using shim technology to monitor DCE runtime performance
Obtaining performance data for application or system software is typically di cult, especially when the source code is not available. While popular techniques such as event trappi...
Gregory M. Oster, Richard B. Bunt