Sciweavers

15379 search results - page 106 / 3076
» Protecting users from
Sort
View
WCNC
2008
IEEE
15 years 4 months ago
Unequal Error Protection Irregular Over-Complete Mapping for Wavelet Coded Wireless Video Telephony Using Iterative Source and C
— Since the different bits of the compressed video sequence produced by the BBC’s wavelet-based video codec exhibit different error sensitivity, efficient Unequal Error Protec...
Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo
CASES
2005
ACM
14 years 12 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
13 years 5 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 4 months ago
Providing Differentiated Quality-of-Protection for Surviving Double-Link Failures in WDM Mesh Networks
—Providing differentiated Quality-of-Protection (QoP) for surviving single-link failures in WDM mesh networks has been extensively studied in recent years. This paper investigate...
Xu Shao, Luying Zhou, Weiguo Zheng, Yixin Wang
BROADNETS
2004
IEEE
15 years 1 months ago
Capacity-Efficient Protection with Fast Recovery in Optically Transparent Mesh Networks
Survivability becomes increasingly critical in managing high-speed networks as data traffic continues to grow in both size and importance. In addition, the impact of failures is e...
Sun-il Kim, Steven S. Lumetta