Sciweavers

734 search results - page 125 / 147
» Dynamic programming for impulse controls
Sort
View
ACSC
2006
IEEE
14 years 1 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
ICMCS
2006
IEEE
144views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Receiver-Based Optimization for Video Delivery Over Wireless Links
We consider transfer of video frames over a time-varying wireless channel. When the channel is good, the transmitter can send frames at a higher rate than the receiver can consume...
Carri W. Chan, John G. Apostolopoulos, Yan Li, Nic...
RTAS
2005
IEEE
14 years 1 months ago
A Distributed Real-Time Embedded Application for Surveillance, Detection, and Tracking of Time Critical Targets
As computer systems become increasingly internetworked, there is a growing class of distributed realtime embedded (DRE) applications that have characteristics and present challeng...
Joseph P. Loyall, Richard E. Schantz, David Corman...
SC
2005
ACM
14 years 1 months ago
Making Sequential Consistency Practical in Titanium
The memory consistency model in parallel programming controls the order in which operations performed by one thread may be observed by another. Language designers have been reluct...
Amir Kamil, Jimmy Su, Katherine A. Yelick
ATAL
2005
Springer
14 years 1 months ago
Agent synthesis: partnership and agreement in cooperative mobile agents
This work focuses on an emerging extension to traditional agent models, called Hierarchical Mobile Agents model, where an agent can contain other agents recursively. The model ena...
Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshiok...