Sciweavers

24188 search results - page 4714 / 4838
» Computing on Encrypted Data
Sort
View
MM
2006
ACM
93views Multimedia» more  MM 2006»
15 years 10 months ago
Scaling laws and tradeoffs in peer-to-peer live multimedia streaming
It is well-known that live multimedia streaming applications operate more efficiently when organized in peer-to-peer (P2P) topologies, since peer upload capacities are utilized t...
Tara Small, Ben Liang, Baochun Li
155
Voted
MOBICOM
2006
ACM
15 years 10 months ago
Analysis and implications of student contact patterns derived from campus schedules
Characterizing mobility or contact patterns in a campus environment is of interest for a variety of reasons. Existing studies of these patterns can be classified into two basic a...
Vikram Srinivasan, Mehul Motani, Wei Tsang Ooi
MSR
2006
ACM
15 years 10 months ago
Using software birthmarks to identify similar classes and major functionalities
Software birthmarks are unique and native characteristics of every software component. Two components having similar birthmarks indicate that they are similar in functionality, st...
Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Ha...
MSWIM
2006
ACM
15 years 10 months ago
Gateway adaptive pacing for TCP across multihop wireless networks and the Internet
In this paper, we introduce an effective congestion control scheme for TCP over hybrid wireless/wired networks comprising a multihop wireless IEEE 802.11 network and the wired Int...
Sherif M. ElRakabawy, Alexander Klemm, Christoph L...
PLDI
2006
ACM
15 years 10 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
« Prev « First page 4714 / 4838 Last » Next »