Sciweavers

160 search results - page 22 / 32
» Uniform Co-Scheduling Using Object-Oriented Design Technique...
Sort
View
119
Voted
CGO
2006
IEEE
15 years 5 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
INFOCOM
1999
IEEE
15 years 4 months ago
Periodic Broadcasting with VBR-Encoded Video
We consider designing near video on demand (VoD) systems that minimize start-up latency while maintaining high image quality. Recently several research teams have developed period...
Despina Saparilla, Keith W. Ross, Martin Reisslein
107
Voted
CIDR
2007
106views Algorithms» more  CIDR 2007»
15 years 1 months ago
Isolation Support for Service-based Applications: A Position Paper
In this paper, we propose an approach that provides the benefits of isolation in service-oriented applications where it is not feasible to use the traditional locking mechanisms u...
Paul Greenfield, Alan Fekete, Julian Jang, Dean Ku...
102
Voted
WSCG
2004
185views more  WSCG 2004»
15 years 1 months ago
Automatic Fitting and Control of Complex Freeform Shapes in 3-D
In many computer graphics and computer-aided design problems, it is very common to find a smooth and well structured surface to fit a set of unstructured 3-dimensional data. Altho...
Yu Song, Joris S. M. Vergeest, Chensheng Wang
P2P
2009
IEEE
126views Communications» more  P2P 2009»
15 years 6 months ago
Robust Lifetime Measurement in Large-Scale P2P Systems with Non-Stationary Arrivals
—Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work [26] has shown that direct sampling...
Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri...