Sciweavers

12697 search results - page 2327 / 2540
» Call for Papers
Sort
View
IPPS
2005
IEEE
14 years 4 months ago
PReCinCt: A Scheme for Cooperative Caching in Mobile Peer-to-Peer Systems
Mobile Peer-to-Peer (MP2P) systems consist of mobile peers that collaborate with each other to complete application problems. Information sharing in such environments is a challen...
Huaping Shen, Mary Suchitha Joseph, Mohan Kumar, S...
ISCA
2005
IEEE
119views Hardware» more  ISCA 2005»
14 years 4 months ago
Rescue: A Microarchitecture for Testability and Defect Tolerance
Scaling feature size improves processor performance but increases each device’s susceptibility to defects (i.e., hard errors). As a result, fabrication technology must improve s...
Ethan Schuchman, T. N. Vijaykumar
ISM
2005
IEEE
133views Multimedia» more  ISM 2005»
14 years 4 months ago
Image Based Tracking of News Stories
Broadcasters often reuse video clips while reporting news stories. New clips are added to the story as it develops replacing old clips. A subset of these video clips may be replay...
Jedrzej Z. Miadowicz, John M. Gauch, Abhishek Shiv...
LCN
2005
IEEE
14 years 4 months ago
Implementation and Performance Analysis of a Packet Scheduler on a Programmable Network Processor
— The problem of achieving fairness in the allocation of the bandwidth resource on a link shared by multiple flows of traffic has been extensively researched over the last deca...
Fariza Sabrina, Salil S. Kanhere, Sanjay Jha
SISW
2005
IEEE
14 years 4 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
« Prev « First page 2327 / 2540 Last » Next »