Sciweavers

305 search results - page 41 / 61
» Estimating the Numbers of End Users and End User Programmers
Sort
View
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Media Aware Routing in Large Scale Networks with Overlay
This paper presents a new routing strategy, that selects the best network paths in an overlay network, in order to minimize the distortion perceived by the end user. We first pro...
Dan Jurca, Sanja Petrovic, Pascal Frossard

Publication
198views
13 years 10 months ago
Real time policy based management of workflows for SLA Adherence
The need for service providers to offer SLAs to gain consumers confidence has become increasingly apparent. Our work focuses on providers who manage the execution of long-running d...
Daniel Spaven, Madhavi Rani, Sumit Kumar Bose, Mik...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
13 years 9 months ago
On Channel Coding Selection in Time-Slotted ALOHA Packetized Multiple-Access Systems Over Rayleigh Fading Channels
— In this paper, we consider the time-slotted ALOHA packetized multiple-access system where the transmission channels obey i.i.d (independent identically distributed) Rayleigh fa...
Chen Wei, Pingyi Fan, Khaled Ben Letaief
CIC
2006
141views Communications» more  CIC 2006»
13 years 8 months ago
Towards the Integration of Reliability and Traffic Engineering
The main goal of this paper is to make a step towards the development of a unified approach that incorporates both reliability and traffic engineering aspects into a common, unifie...
Andras Farago
IWSEC
2009
Springer
14 years 1 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...