This paper addresses several aspects related to the distribution of content. The first aim is to provide an overview of the Universal Multimedia Access (UMA) concept. The primary...
This paper presents a case study of the 10-Gigabit Ethernet (10GbE) adapter from Intel R . Specifically, with appropriate optimizations to the configurations of the 10GbE adapte...
Wu-chun Feng, Justin Gus Hurwitz, Harvey B. Newman...
We present new hardware-accelerated techniques for rendering surface light fields with opacity hulls that allow for interactive visualization of objects that have complex reflec...
Daniel Vlasic, Hanspeter Pfister, Sergey Molinov, ...
We first describe a multi-agent system managing a corporate memory in the form of a corporate semantic web. We then focus on a newly introduced society of agents in charge of wrap...
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...