Sciweavers

11217 search results - page 2072 / 2244
» Network Coding for Wireless Networks
Sort
View
ASPDAC
2011
ACM
217views Hardware» more  ASPDAC 2011»
14 years 2 months ago
Realization and performance comparison of sequential and weak memory consistency models in network-on-chip based multi-core syst
This paper studies realization and performance comparison of the sequential and weak consistency models in the network-on-chip (NoC) based distributed shared memory (DSM) multi-cor...
Abdul Naeem, Xiaowen Chen, Zhonghai Lu, Axel Jants...
TLDI
2009
ACM
142views Formal Methods» more  TLDI 2009»
15 years 7 months ago
Static extraction of sound hierarchical runtime object graphs
For many object-oriented systems, it is often useful to have a runtime architecture that shows networks of communicating objects. But it is hard to statically extract runtime obje...
Marwan Abi-Antoun, Jonathan Aldrich
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 5 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
ANSS
2008
IEEE
15 years 5 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
106
Voted
ICMCS
2008
IEEE
150views Multimedia» more  ICMCS 2008»
15 years 5 months ago
Scalable video adaptation optimization using soft decision scheme
Video transmission over a heterogeneous network suffers a condition that it has required to satisfy many different constraints because of the variety limitations of client equipme...
Chia-Ho Pan, Sheng-Chieh Huang, I-Hsien Lee, Chung...
« Prev « First page 2072 / 2244 Last » Next »