Sciweavers

4044 search results - page 796 / 809
» The Evolution of a Distributed Operating System
Sort
View
DRM
2007
Springer
15 years 4 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
LCPC
2007
Springer
15 years 3 months ago
Pillar: A Parallel Implementation Language
Abstract. As parallelism in microprocessors becomes mainstream, new programming languages and environments are emerging to meet the challenges of parallel programming. To support r...
Todd Anderson, Neal Glew, Peng Guo, Brian T. Lewis...
INFOCOM
2006
IEEE
15 years 3 months ago
Generalized Proportional Fair Scheduling in Third Generation Wireless Data Networks
—In 3G data networks, network operators would like to balance system throughput while serving users in a fair manner. This is achieved using the notion of proportional fairness. ...
Tian Bu, L. Li, Ramachandran Ramjee
INFOCOM
2006
IEEE
15 years 3 months ago
Capacity of Wireless Data Networks with Intra- and Inter-Cell Mobility
— The performance of wireless data systems has been thoroughly studied in the context of a single base station. In the present paper we analyze networks with several interacting ...
Sem C. Borst, Alexandre Proutiére, Nidhi He...
ACCV
2006
Springer
15 years 3 months ago
A Multiscale Co-linearity Statistic Based Approach to Robust Background Modeling
Background subtraction is an essential task in several static camera based computer vision systems. Background modeling is often challenged by spatio-temporal changes occurring due...
Prithwijit Guha, Dibyendu Palai, K. S. Venkatesh, ...