Sciweavers

10674 search results - page 2074 / 2135
» The Virtual Environment - Another Approach
Sort
View
138
Voted
ICDE
2006
IEEE
159views Database» more  ICDE 2006»
15 years 10 months ago
Replication Based on Objects Load under a Content Distribution Network
Users tend to use the Internet for “resource-hungry” applications (which involve content such as video, audio on-demand and distributed data) and at the same time, more and mo...
George Pallis, Konstantinos Stamos, Athena Vakali,...
128
Voted
IEEEPACT
2006
IEEE
15 years 10 months ago
A low-cost memory remapping scheme for address bus protection
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryp...
Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhan...
INFOCOM
2006
IEEE
15 years 10 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang
INFOCOM
2006
IEEE
15 years 10 months ago
RandPeer: Membership Management for QoS Sensitive Peer-to-Peer Applications
— Many Peer-to-peer (P2P) applications such as media broadcasting and content distribution require a high performance overlay structure in order to deliver satisfying quality of ...
Jin Liang, Klara Nahrstedt
IROS
2006
IEEE
165views Robotics» more  IROS 2006»
15 years 10 months ago
Grounded Situation Models for Robots: Where words and percepts meet
— Our long-term objective is to develop robots that engage in natural language-mediated cooperative tasks with humans. To support this goal, we are developing an amodal represent...
Nikolaos Mavridis, Deb Roy
« Prev « First page 2074 / 2135 Last » Next »