Sciweavers

521 search results - page 84 / 105
» Content in Embedded Sentences
Sort
View
RTAS
2005
IEEE
14 years 1 months ago
VPN Gateways over Network Processors: Implementation and Evaluation
Networking applications, such as VPN and content filtering, demand extra computing power in order to meet the throughput requirement nowadays. In addition to pure ASIC solutions, ...
Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-C...
RTSS
2005
IEEE
14 years 1 months ago
Enhancing the Robustness of Distributed Real-Time Middleware via End-to-End Utilization Control
A key challenge for distributed real-time and embedded (DRE) middleware is maintaining both system reliability and desired real-time performance in unpredictable environments wher...
Xiaorui Wang, Chenyang Lu, Xenofon D. Koutsoukos
EGC
2005
Springer
14 years 28 days ago
WebGrid: A New Paradigm for Web System
World Wide Web is one of the most important applications on the Internet. Net surfers can browse the Web pages by tracing the links embedded in the hypertexts. However, one will be...
Liutong Xu, Bai Wang, Bo Ai
INEX
2005
Springer
14 years 28 days ago
A Flexible Structured-Based Representation for XML Document Mining
This paper reports on the INRIA group’s approach to XML mining while participating in the INEX XML Mining track 2005. We use a flexible representation of XML documents that allo...
Anne-Marie Vercoustre, Mounir Fegas, Saba Gul, Yve...
KES
2005
Springer
14 years 27 days ago
Zero-Based Code Modulation Technique for Digital Video Fingerprinting
Digital fingerprinting is a technique to protect digital contents from illegal reproduction and redistribution by marking unique information for individual user. A powerful but sim...
In Koo Kang, Hae-Yeoun Lee, Won-Young Yoo, Heung-K...