Sciweavers

11217 search results - page 1922 / 2244
» Network Coding for Wireless Networks
Sort
View
118
Voted
DSN
2005
IEEE
15 years 9 months ago
Modeling and Automated Containment of Worms
Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have drawn significant attention due to their enormous adverse impact on the Internet. There is a grea...
Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi
112
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
121
Voted
ICMCS
2005
IEEE
105views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Streaming layered encoded video using peers
Peer-to-peer video streaming has emerged as an important means to transport stored video. The peers are less costly and more scalable than an infrastructure-basedvideo streaming n...
Yanming Shen, Zhengye Liu, Shivendra S. Panwar, Ke...
130
Voted
NCA
2005
IEEE
15 years 9 months ago
Reducing the Communication Cost via Chain Pattern Scheduling
This paper deals with general nested loops and proposes a novel scheduling methodology for reducing the communication cost of parallel programs. General loops contain complex loop...
Florina M. Ciorba, Theodore Andronikos, Ioannis Dr...
104
Voted
PDP
2005
IEEE
15 years 9 months ago
Distributed Data Collection through Remote Probing in Windows Environments
Distributed Data Collector (DDC) is a framework to ease and automate repetitive executions of console applications (probes) over a set of LAN networked Windows personal computers....
Patrício Domingues, Paulo Marques, Lu&iacut...
« Prev « First page 1922 / 2244 Last » Next »