Sciweavers

183 search results - page 25 / 37
» P Systems with String Objects and with Communication by Requ...
Sort
View
IJAMC
2010
118views more  IJAMC 2010»
14 years 8 months ago
Bandwidth-aware Peer-to-Peer 3D streaming
—Peer-to-Peer streaming support for 3D content (i.e., P2P 3D streaming) has recently been proposed to provide affordable and real-time virtual environment (VE) content delivery. ...
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang, Chu...
98
Voted
DASFAA
2007
IEEE
165views Database» more  DASFAA 2007»
15 years 2 months ago
Making the Most of Cache Groups
Cache groups are a powerful concept for database caching, which is used to relieve the backend database load and to keep referenced data close to the application programs at the &q...
Andreas Bühmann, Theo Härder
USS
2004
14 years 11 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
GIS
2008
ACM
15 years 11 months ago
Privacy: preserving trajectory collection
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
Gyözö Gidófalvi, Torben Bach Pede...
INFOCOM
2006
IEEE
15 years 4 months ago
QoS, Properties and Views to Achieve Dynamic Adaptivity
— This paper presents our work in the context of the Adaptive Resource Management (ARM) internal research project at the University of Milano-Bicocca, Italy. The project addresse...
Stefano Mussino, Mario Riva