Sciweavers

2251 search results - page 217 / 451
» Network Coding Based Data Distribution in WiMAX
Sort
View
DSN
2008
IEEE
15 years 5 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
MM
2003
ACM
146views Multimedia» more  MM 2003»
15 years 9 months ago
Supporting timeliness and accuracy in distributed real-time content-based video analysis
Real-time content-based access to live video data requires content analysis applications that are able to process the video data at least as fast as the video data is made availab...
Viktor S. Wold Eide, Frank Eliassen, Ole-Christoff...
131
Voted
ALGORITHMICA
2006
139views more  ALGORITHMICA 2006»
15 years 4 months ago
CONQUEST: A Coarse-Grained Algorithm for Constructing Summaries of Distributed Discrete Datasets
Abstract. In this paper we present a coarse-grained parallel algorithm, CONQUEST, for constructing boundederror summaries of high-dimensional binary attributed data in a distribute...
Jie Chi, Mehmet Koyutürk, Ananth Grama
ICNS
2006
IEEE
15 years 10 months ago
Proposal for compilation techniques of monitoring tasks to improve applications management performance
The emergence of middleware solutions and new services, even on small devices, will need adapted distributed management solutions which address these specificities, both in terms ...
Bernard Kaddour, Joël Quinqueton
INFOCOM
2000
IEEE
15 years 8 months ago
Admission Control Based on End-to-End Measurements
— This paper proposes a controlled-load service that provides a network state with bounded and well known worst-case behavior. The service is primarily developed for real-time ap...
Viktória Elek, Gunnar Karlsson, Robert R&ou...