Sciweavers

1469 search results - page 218 / 294
» Map operations and k-orbit maps
Sort
View
105
Voted
INFOCOM
2002
IEEE
15 years 5 months ago
KNITS: Switch-based Connection Hand-off
—This paper describes a mechanism allowing nodes to hand-off active connections by utilizing connection splicing at an edge-switch serving as a gateway to a server cluster. The m...
Eric Van Hensbergen, Athanasios E. Papathanasiou
ISCAS
2002
IEEE
114views Hardware» more  ISCAS 2002»
15 years 5 months ago
Lossless, near-lossless and lossy adaptive coding based on the lossless DCT
This report proposes a new coding method, which realizes lossless, near-lossless and lossy coding with a unified single algorithm. The method is based on a lifting-structured loss...
Somchart Chokchaitam, Masahiro Iwahashi
SAC
2009
ACM
15 years 5 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
84
Voted
FPL
2009
Springer
106views Hardware» more  FPL 2009»
15 years 5 months ago
Coarse-grained dynamically reconfigurable architecture with flexible reliability
This paper proposes a coarse-grained dynamically reconfigurable architecture, which offers flexible reliability to soft errors and aging. A notion of cluster is introduced as a ...
Dawood Alnajiar, Younghun Ko, Takashi Imagawa, Hir...
ECOOP
2001
Springer
15 years 5 months ago
Distinctness and Sharing Domains for Static Analysis of Java Programs
Abstract. The application field of static analysis techniques for objectoriented programming is getting broader, ranging from compiler optimizations to security issues. This leads...
Isabelle Pollet, Baudouin Le Charlier, Agostino Co...