Sciweavers

5451 search results - page 918 / 1091
» Typed Operational Semantics
Sort
View
120
Voted
ACSC
2005
IEEE
15 years 9 months ago
Flexible Exclusion Control for Composite Objects
We present a simple approach for implementing flexible locking strategies in a system of components, which may themselves be composite objects. The approach is flexible in that a ...
Abdelsalam Shanneb, John Potter
DSN
2005
IEEE
15 years 9 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
HPDC
2005
IEEE
15 years 9 months ago
A new metric for robustness with application to job scheduling
Scheduling strategies for parallel and distributed computing have mostly been oriented toward performance, while striving to achieve some notion of fairness. With the increase in ...
Darin England, Jon B. Weissman, Jayashree Sadagopa...
ICMCS
2005
IEEE
101views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Speech-adaptive layered G.729 coder for loss concealments of real-time voice over IP
In this paper, we propose a speech-adaptive layered-coding (LC) scheme for the loss concealments of real-time CELPcoded speech transmitted over IP networks. Based on the ITU G.729...
Batu Sat, Benjamin W. Wah
ICMCS
2005
IEEE
91views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Supporting rights checking in an MPEG-21 Digital Item Processing environment
Within the world of multimedia, the new MPEG-21 standard is currently under development. The purpose of this new standard is to create an open framework for multimedia delivery an...
Frederik De Keukelaere, Thomas DeMartini, Jeroen B...