Sciweavers

4693 search results - page 806 / 939
» Verifying Hybrid Systems
Sort
View
83
Voted
STORAGESS
2006
ACM
15 years 6 months ago
Limiting trust in the storage stack
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on ...
Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea...
99
Voted
CGO
2005
IEEE
15 years 6 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
ICAS
2005
IEEE
85views Robotics» more  ICAS 2005»
15 years 6 months ago
Supporting Consistency Management in Dynamic Content Distribution Overlays
Content Distribution Overlays improves end-user performance by replicating Web contents on a group of geographically distributed sites interconnected over the Internet. However, w...
Zhou Su, Jiro Katto, Yasuhiko Yasuda
ICAS
2005
IEEE
88views Robotics» more  ICAS 2005»
15 years 6 months ago
A New Approach for the Construction of ALM Trees using Layered Coding
— This paper presents a novel approach for efficient tree construction in ALM (Application Layer Multicast) using layered video coding. This system is suitable for the users in h...
Yohei Okada, Masato Oguro, Jiro Katto, Sakae Okubo
108
Voted
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Adaptive Live Streaming Over Enterprise Networks
In this paper we present multimedia adaptation strategies for live video streams, at the streaming server, where we switch among several versions of the coded multimedia to match ...
Deepak S. Turaga, Ahmed Abd El Al, Chitra Venkatra...