Sciweavers

832 search results - page 148 / 167
» Effect of Malicious Synchronization
Sort
View
VLSISP
2010
117views more  VLSISP 2010»
13 years 8 months ago
Video Streaming with Network Coding
Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably, Content Delivery Networks (CDN) and Peer-to-Peer (P2P) networks ha...
Kien Nguyen, Thinh Nguyen, Sen-Ching S. Cheung
IPPS
2010
IEEE
13 years 7 months ago
Multicore-aware reuse distance analysis
This paper presents and validates methods to extend reuse distance analysis of application locality characteristics to shared-memory multicore platforms by accounting for invalidat...
Derek L. Schuff, Benjamin S. Parsons, Vijay S. Pai
REFSQ
2010
Springer
13 years 7 months ago
Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context
[Context and motivation] When developing software, coordination between different organizational units is essential in order to develop a good quality product, on time and within b...
Giedre Sabaliauskaite, Annabella Loconsole, Emelie...
DOCENG
2009
ACM
13 years 7 months ago
Relating declarative hypermedia objects and imperative objects through the NCL glue language
This paper focuses on the support provided by NCL (Nested Context Language) to relate objects with imperative code content and declarative hypermedia-objects (objects with declara...
Luiz Fernando Gomes Soares, Marcelo Ferreira Moren...
ICCV
2009
IEEE
13 years 7 months ago
Complex volume and pose tracking with probabilistic dynamical models and visual hull constraints
We propose a method for estimating the pose of a human body using its approximate 3D volume (visual hull) obtained in real time from synchronized videos. Our method can cope with ...
Norimichi Ukita, Michiro Hirai, Masatsugu Kidode