Sciweavers

2422 search results - page 457 / 485
» Composition of Services with Constraints
Sort
View
ICIP
2010
IEEE
13 years 8 months ago
P2P group communication using Scalable Video Coding
P2P-streaming has become of high interest in the last years, since it reduces the load on expensive servers, due to the participation of receivers in the media transmission. In th...
Yago Sanchez de la Fuente, Thomas Schierl, Corneli...
ICSOC
2010
Springer
13 years 8 months ago
Automatic Fragment Identification in Workflows Based on Sharing Analysis
In Service-Oriented Computing (SOC), fragmentation and merging of workflows are motivated by a number of concerns, among which we can cite design issues, performance, and privacy. ...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 7 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
ICIP
2009
IEEE
13 years 7 months ago
A low-complexity reduced-reference print identification algorithm
In a print production system, the ability to match a printed document with its original electronic form enables services that improve robustness of the production process, such as...
Matthew Gaubatz, Robert Ulichney, David M. Rouse
ICPP
2009
IEEE
13 years 7 months ago
Stochastic-Based Robust Dynamic Resource Allocation in a Heterogeneous Computing System
Abstract--This research investigates the problem of robust dynamic resource allocation for heterogeneous distributed computing systems operating under imposed constraints. Often, s...
Jay Smith, Edwin K. P. Chong, Anthony A. Maciejews...