Sciweavers

461 search results - page 80 / 93
» Protecting Transportation Infrastructure
Sort
View
CN
2006
79views more  CN 2006»
14 years 9 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
95
Voted
TPDS
2002
104views more  TPDS 2002»
14 years 9 months ago
Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach
The Internet is undergoing substantial changes from a communication and browsing infrastructure to a medium for conducting business and marketing a myriad of services. The World W...
Tarek F. Abdelzaher, Kang G. Shin, Nina T. Bhatti
ASPLOS
2011
ACM
14 years 1 months ago
Mementos: system support for long-running computation on RFID-scale devices
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints be...
Benjamin Ransford, Jacob Sorber, Kevin Fu
ICIP
2007
IEEE
15 years 11 months ago
Selective Streaming of Multi-View Video for Head-Tracking 3D Displays
We present a novel client-driven multi-view video streaming system that allows a user watch 3-D video interactively with significantly reduced bandwidth requirements by transmitti...
Engin Kurutepe, M. Reha Civanlar, A. Murat Tekalp
ISESE
2006
IEEE
15 years 3 months ago
An industrial case study of structural testing applied to safety-critical embedded software
Effective testing of safety-critical real-time embedded software is difficult and expensive. Many companies are hesitant about the cost of formalized criteria-based testing and a...
Jing Guan, Jeff Offutt, Paul Ammann