Sciweavers

4330 search results - page 854 / 866
» Analyzing security architectures
Sort
View
EUROPAR
2009
Springer
13 years 10 months ago
Surfing Peer-to-Peer IPTV: Distributed Channel Switching
It is now common for IPTV systems attracting millions of users to be based on a peer-to-peer (P2P) architecture. In such systems, each channel is typically associated with one P2P ...
Anne-Marie Kermarrec, Erwan Le Merrer, Yaning Liu,...
CAMAD
2006
IEEE
13 years 10 months ago
A packet-level characterization of network traffic
In this paper we show results from a packet-level traffic characterization aiming at finding spatial and temporal invariances of TCP based applications, such as HTTP and SMTP. We d...
Alberto Dainotti, Antonio Pescapè, Giorgio ...
ERCIMDL
2006
Springer
183views Education» more  ERCIMDL 2006»
13 years 10 months ago
Design of a Cross-Media Indexing System
There is a lack of an integrated technology that will increase effective usage of the vast and heterogeneous multi-lingual and multimedia digital content. The need is being express...
Murat Yakici, Fabio Crestani
DSD
2009
IEEE
118views Hardware» more  DSD 2009»
13 years 10 months ago
On the Risk of Fault Coupling over the Chip Substrate
—Duplication and comparison has proven to be an efficient method for error detection. Based on this generic principle dual core processor architectures with output comparison ar...
Peter Tummeltshammer, Andreas Steininger
ASAP
2007
IEEE
112views Hardware» more  ASAP 2007»
13 years 8 months ago
Scheduling Register-Allocated Codes in User-Guided High-Level Synthesis
In high-level synthesis, as for compilers, an important question is when register assignment should take place. Unlike compilers for which the processor architecture is given, syn...
Alain Darte, C. Quinson