Sciweavers

5234 search results - page 840 / 1047
» Simulation of Computer Network Attacks
Sort
View
MM
2009
ACM
160views Multimedia» more  MM 2009»
15 years 11 months ago
On statistical multiplexing of variable-bit-rate video streams in mobile systems
We consider the problem of broadcasting multiple variable-bit-rate (VBR) video streams from a base station to many mobile devices over a wireless network, so that: (i) perceived q...
Cheng-Hsin Hsu, Mohamed Hefeeda
ICPR
2006
IEEE
16 years 5 months ago
3D Segmentation by Maximally Stable Volumes (MSVs)
This paper introduces an efficient 3D segmentation concept, which is based on extending the well-known Maximally Stable Extremal Region (MSER) detector to the third dimension. The...
Horst Bischof, Michael Donoser
DAC
2002
ACM
16 years 5 months ago
A framework for evaluating design tradeoffs in packet processing architectures
We present an analytical method to evaluate embedded network packet processor architectures, and to explore their design space. Our approach is in contrast to those based on simul...
Lothar Thiele, Matthias Gries, Samarjit Chakrabort...
WWW
2003
ACM
16 years 5 months ago
A Multicast-On-Large-Demand Approach to the Flash Crowd Problem
In this paper we propose a multicast-on-large-demand (MOLD) approach to the flash crowd problem. A MOLD Web server may dynamically open a multicast channel for resources when dete...
Rocky K. C. Chang
SAC
2009
ACM
15 years 11 months ago
Lightweight monitoring of sensor software
Wireless sensors are very small computers, and understanding the timing and behavior of software written for them is crucial to ensuring that they perform correctly. This paper ou...
Mustafa Hammad, Jonathan Cook