Sciweavers

353 search results - page 57 / 71
» Analyzing concurrency in streaming applications
Sort
View
RAID
2007
Springer
14 years 4 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
CSREASAM
2006
13 years 11 months ago
On Security in TCP/IP over Wireless Network
- The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of th...
Shamila Makki, Wunnava V. Subbarao
MTA
2002
195views more  MTA 2002»
13 years 9 months ago
Shot Partitioning Based Recognition of TV Commercials
Digital video applications exploit the intrinsic structure of video sequences. In order to obtain and represent this structure for video annotation and indexing tasks, the main ini...
Juan María Sánchez, Xavier Binefa, J...
SI3D
2005
ACM
14 years 3 months ago
A camera-based interface for interaction with mobile handheld computers
Recent advances in mobile computing allow the users to deal with 3D interactive graphics on handheld computers. Although the computing resources and screen resolutions grow steadi...
Martin Hachet, Joachim Pouderoux, Pascal Guitton
ISCAPDCS
2007
13 years 11 months ago
Efficient soft QoS guarantee in mobile ad hoc networks
More and more Quality of Service (QoS) sensitive applications, such as streaming media, high bandwidth content distribution and VoIP, will be deployed in Mobile Ad hoc Networks (M...
Gaogang Xie, Zhenyu Li, Valérie Issarny, Al...