Sciweavers

2572 search results - page 327 / 515
» codes 2008
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 10 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
TRIDENTCOM
2008
IEEE
15 years 10 months ago
Single versus multi-hop wireless reprogramming in sensor networks
— Wireless reprogramming of the sensor network is useful for uploading new code or for changing the functionality of the existing code. In recent years, the research focus has sh...
Rajesh Krishna Panta, Saurabh Bagchi, Issa Khalil,...
VL
2008
IEEE
138views Visual Languages» more  VL 2008»
15 years 10 months ago
A case study of API redesign for improved usability
As software grows more complex, software developers’ productivity is increasingly defined by their ability to effectively reuse code. Even APIs (application programming interfac...
Jeffrey Stylos, Benjamin Graf, Daniela K. Busse, C...
VTC
2008
IEEE
126views Communications» more  VTC 2008»
15 years 10 months ago
On the Impact of Coarse Synchronization on the Performance of Broadcast/Multicast Single Frequency Network Operation in WCDMA
Abstract—We evaluate the system-level performance and potential capacity gain of MBSFN (Multicast/Broadcast Single Frequency Network) operation in Wideband CDMA (WCDMA) and compa...
Christoph A. Jotten, Christian Sgraja, Josef J. Bl...
VTC
2008
IEEE
239views Communications» more  VTC 2008»
15 years 10 months ago
Cross-Layer and Path Priority Scheduling Based Real-Time Video Communications over Wireless Sensor Networks
—This paper addresses the problem of real-time video streaming over a bandwidth and energy constrained wireless sensor network (WSN). Considering the compressed video bit stream ...
Min Chen, Victor C. M. Leung, Shiwen Mao, Ming Li