Sciweavers

1034 search results - page 154 / 207
» Dynamic Access Control Framework Based On Events
Sort
View
ICMCS
2006
IEEE
144views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Receiver-Based Optimization for Video Delivery Over Wireless Links
We consider transfer of video frames over a time-varying wireless channel. When the channel is good, the transmitter can send frames at a higher rate than the receiver can consume...
Carri W. Chan, John G. Apostolopoulos, Yan Li, Nic...
ATAL
2005
Springer
14 years 1 months ago
T-Man: Gossip-Based Overlay Topology Management
Overlay topology plays an important role in P2P systems. Topology serves as a basis for achieving functions such as routing, searching and information dissemination, and it has a m...
Márk Jelasity, Özalp Babaoglu
PERVASIVE
2007
Springer
14 years 2 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...
DATE
2009
IEEE
105views Hardware» more  DATE 2009»
14 years 2 months ago
Exploiting narrow-width values for thermal-aware register file designs
—Localized heating-up creates thermal hotspots across the chip, with the integer register file ranked as the hottest unit in high-performance microprocessors. In this paper, we ...
Shuai Wang, Jie Hu, Sotirios G. Ziavras, Sung Woo ...
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
14 years 14 days ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser