Sciweavers

5962 search results - page 934 / 1193
» Working with Patterns and Code
Sort
View
AINA
2009
IEEE
15 years 11 months ago
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks
In this paper we present a low-complexity traffic prioritization strategy for video transmission using the H.264 scalable video coding (SVC) standard over 802.11e wireless networ...
Dario Gallucci, Attilio Fiandrotti, Enrico Masala,...
PPOPP
2009
ACM
15 years 11 months ago
NePalTM: design and implementation of nested parallelism for transactional memory systems
Abstract. Transactional memory (TM) promises to simplify construction of parallel applications by allowing programmers to reason about interactions between concurrently executing c...
Haris Volos, Adam Welc, Ali-Reza Adl-Tabatabai, Ta...
PPPJ
2009
ACM
15 years 11 months ago
Lazy continuations for Java virtual machines
Continuations, or ’the rest of the computation’, are a concept that is most often used in the context of functional and dynamic programming languages. Implementations of such ...
Lukas Stadler, Christian Wimmer, Thomas Würth...
CCS
2009
ACM
15 years 11 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
163
Voted
COMPSAC
2009
IEEE
15 years 11 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...