Sciweavers

2513 search results - page 332 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
STOC
1997
ACM
257views Algorithms» more  STOC 1997»
15 years 4 months ago
Practical Loss-Resilient Codes
We present randomized constructions of linear-time encodable and decodable codes that can transmit over lossy channels at rates extremely close to capacity. The encoding and decod...
Michael Luby, Michael Mitzenmacher, Mohammad Amin ...
CORR
2011
Springer
213views Education» more  CORR 2011»
14 years 7 months ago
Liquidsoap: a High-Level Programming Language for Multimedia Streaming
Generating multimedia streams, such as in a netradio, is a task which is complex and difficult to adapt to every users’ needs. We introduce a novel approach in order to achieve i...
David Baelde, Romain Beauxis, Samuel Mimram
89
Voted
ICECCS
1998
IEEE
110views Hardware» more  ICECCS 1998»
15 years 5 months ago
Risk Assessment and Integrity in System Design
All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system imp...
Raymond Berg, Victor L. Winter
99
Voted
OOPSLA
1998
Springer
15 years 4 months ago
JRes: A Resource Accounting Interface for Java
With the spread of the Internet the computing model on server systems is undergoing several important changes. Recent research ideas concerning dynamic operating system extensibil...
Grzegorz Czajkowski, Thorsten von Eicken
108
Voted
ATAL
2005
Springer
15 years 2 months ago
Rockwell automation agents for manufacturing
The paper provides an overview of the agent-based solutions developed by the Rockwell Automation company for the purposes of industrial control. Using agent-based manufacturing co...
Vladimír Marík, Pavel Vrba, Kenwood ...