Sciweavers

2663 search results - page 202 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
MM
2005
ACM
167views Multimedia» more  MM 2005»
15 years 4 months ago
SensEye: a multi-tier camera sensor network
This paper argues that a camera sensor network containing heterogeneous elements provides numerous benefits over traditional homogeneous sensor networks. We present the design an...
Purushottam Kulkarni, Deepak Ganesan, Prashant J. ...
96
Voted
MM
2005
ACM
121views Multimedia» more  MM 2005»
15 years 4 months ago
Impact of incentive mechanisms on quality of experience
Since entities participating in P2P networks are usually autonomous and therefore free to decide on their level of participation, mechanisms to resolve conflicts between individu...
Andrew Roczniak, Abdulmotaleb El-Saddik
91
Voted
IWMM
2004
Springer
101views Hardware» more  IWMM 2004»
15 years 4 months ago
Exploring the barrier to entry: incremental generational garbage collection for Haskell
We document the design and implementation of a “production” incremental garbage collector for GHC 6.2. It builds on our earlier work (Non-stop Haskell) that exploited GHC’s ...
Andrew M. Cheadle, A. J. Field, Simon Marlow, Simo...
CASES
2005
ACM
15 years 26 days ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
88
Voted
DBSEC
2007
128views Database» more  DBSEC 2007»
15 years 11 days ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...