Sciweavers

943 search results - page 167 / 189
» Simulation based deadlock analysis for system level designs
Sort
View
VRCAI
2004
ACM
15 years 2 months ago
Explorative construction of virtual worlds: an interactive kernel approach
Despite steady research advances in many aspects of virtual reality, building and testing virtual worlds remains to be a very difficult process. Most virtual environments are stil...
Jinseok Seo, Gerard Jounghyun Kim
PARA
1998
Springer
15 years 1 months ago
Technologies for Teracomputing: A European Option
Abstract. Ahardware and software environment with performance above 1 Tera ops (teracomputing) is presently required to face the leading computational challenges not only in fundam...
Agostino Mathis
MM
2003
ACM
118views Multimedia» more  MM 2003»
15 years 2 months ago
PROMISE: peer-to-peer media streaming using CollectCast
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer media streaming system encompassing the key functions of peer lookup, peer-based aggregated ...
Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan...
INFOCOM
2007
IEEE
15 years 3 months ago
Two-Tier Load Balancing in OSPF Wireless Back-Hauls
Abstract— High-speed wireless communication technology (e.g. WiMAX) makes it feasible and cost-effective to build wireless back-hauls for Internet access. Compared to wired count...
Xiaowen Zhang, Hao Zhu
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 3 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee