Sciweavers

595 search results - page 85 / 119
» Session 7: Demonstrations
Sort
View
MMNS
2001
151views Multimedia» more  MMNS 2001»
14 years 11 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
USENIX
2004
14 years 11 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...
TE
2010
89views more  TE 2010»
14 years 4 months ago
An Electrical Engineering Summer Academy for Middle School and High School Students
The Electrical Engineering Summer Academy for Pre-College Students was held at the University of Tulsa from June 11th through June 15th , 2007. Of the 20 students accepted, 19 par...
Peter LoPresti, Theodore W. Manikas, Jeff Kohlbeck
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
15 years 4 months ago
Video copy detection by fast sequence matching
Sequence matching techniques are effective for comparing two videos. However, existing approaches suffer from demanding computational costs and thus are not scalable for large-sca...
Mei-Chen Yeh, Kwang-Ting Cheng
SIGCOMM
2009
ACM
15 years 4 months ago
Economic issues in shared infrastructures
We define some interesting incentive issues that arise in the management of virtual infrastructures. We demonstrate that participants’ decisions about the quantities of infrast...
Costas Courcoubetis, Richard R. Weber