Sciweavers

10633 search results - page 1672 / 2127
» Relating Distributed Objects
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 10 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
BDIM
2007
IEEE
95views Business» more  BDIM 2007»
15 years 10 months ago
A Mechanism of Specifying and Determining Pricing in Utility Computing Environments
Utility services providers offer on-demand services for multiple users and applications from a shared resource pool. The utility computing environment provider manages resources th...
Jinsong Ouyang, Akhil Sahai, Jim Pruyne
CISS
2007
IEEE
15 years 10 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid
FDL
2007
IEEE
15 years 10 months ago
An Extension to VHDL-AMS for AMS Systems with Partial Differential Equations
Abstract This paper proposes VHDL-AMS syntax extensions that enable descriptions of AMS systems with partial differential equations. We named the extended language VHDL-AMSP. An im...
Leran Wang, Chenxu Zhao, Tom J. Kazmierski
121
Voted
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 10 months ago
A Peer-to-Peer Approach for Remote Rendering and Image Streaming in Walkthrough Applications
— Motivated by the widespread of file and video streaming over peer-to-peer networks, we propose to investigate the design of a peer-to-peer solution for image-based remote walk...
Azzedine Boukerche, Richard Werner Nelem Pazzi
« Prev « First page 1672 / 2127 Last » Next »