Sciweavers

3424 search results - page 126 / 685
» Building Diverse Computer Systems
Sort
View
AISC
2010
Springer
14 years 23 days ago
Notations Around the World: Census and Exploitation
Mathematical notations around the world are diverse. Not as much as requiring computing machines’ makers to adapt to each culture, but as much as to disorient a person landing on...
Paul Libbrecht
CORR
2006
Springer
110views Education» more  CORR 2006»
13 years 8 months ago
Reliable Multi-Path Routing Schemes for Real-Time Streaming
In off-line streaming, packet level erasure resilient Forward Error Correction (FEC) codes rely on the unrestricted buffering time at the receiver. In real-time streaming, the ext...
Emin Gabrielyan, Roger D. Hersch
NOSSDAV
1993
Springer
14 years 20 hour ago
Probabilistic Assignment of Movies to Storage Devices in a Video-On-Demand System
–A video-on-demand server must satisfy a large customer base and a diverse archive of movies under changing movie popularity and daily load peaks. These requirements must be sati...
Thomas D. C. Little, Dinesh Venkatesh
KES
2008
Springer
13 years 8 months ago
EasyLife: A Location-Aware Service Oriented Mobile Information System
Many examples of Location-aware services have been developed in recent years as the enabling technologies mature. However, these services frequently exist in isolation and address ...
J. M. Shen, Michael J. O'Grady, Gregory M. P. O'Ha...
ISSA
2008
13 years 9 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche