Sciweavers

23 search results - page 3 / 5
» Applications considered harmful for ambient systems
Sort
View
INFOCOM
2009
IEEE
14 years 1 months ago
P2P-TV Systems under Adverse Network Conditions: A Measurement Study
Abstract—In this paper we define a simple experimental setup to analyze the behavior of commercial P2P-TV applications under adverse network conditions. Our goal is to reveal th...
Eugenio Alessandria, Massimo Gallo, Emilio Leonard...
CLUSTER
2005
IEEE
14 years 19 days ago
A Generic Proxy Mechanism for Secure Middlebox Traversal
Firewalls/NATs have brought significant connectivity problems along with their benefits, causing many applications to break or become inefficient. Due to its bi-directional commun...
Se-Chang Son, Matthew Farrellee, Miron Livny
ICDE
2010
IEEE
198views Database» more  ICDE 2010»
14 years 6 months ago
Q-Cop: Avoiding Bad Query Mixes to Minimize Client Timeouts Under Heavy Loads
In three-tiered web applications, some form of admission control is required to ensure that throughput and response times are not significantly harmed during periods of heavy load....
Sean Tozer, Tim Brecht, Ashraf Aboulnaga
SCFBM
2008
119views more  SCFBM 2008»
13 years 6 months ago
OSPACS: Ultrasound image management system
Background: Ultrasound scanning uses the medical imaging format, DICOM, for electronically storing the images and data associated with a particular scan. Large health care facilit...
Will Stott, Andy Ryan, Ian J. Jacobs, Usha Menon, ...
JTAER
2008
103views more  JTAER 2008»
13 years 7 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu