Sciweavers

1201 search results - page 155 / 241
» Exact Analysis of Exact Change
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
ISCAS
2005
IEEE
140views Hardware» more  ISCAS 2005»
14 years 3 months ago
Macroblock-based algorithm for dual-bitstream MPEG video streaming with VCR functionalities
— Reverse playback is the most common video cassette recording (VCR) functions in many digital video players. However, the predictive processing techniques employed in MPEG sever...
Tak-Piu Ip, Yui-Lam Chan, Chang-Hong Fu, Wan-Chi S...
APPROX
2005
Springer
94views Algorithms» more  APPROX 2005»
14 years 3 months ago
Testing Periodicity
A string α ∈ Σn is called p-periodic, if for every i, j ∈ {1, . . . , n}, such that i ≡ j mod p, αi = αj, where αi is the i-th place of α. A string α ∈ Σn is said t...
Oded Lachish, Ilan Newman
DCOSS
2005
Springer
14 years 3 months ago
A Local Facility Location Algorithm for Sensor Networks
In this paper we address a well-known facility location problem (FLP) in a sensor network environment. The problem deals with finding the optimal way to provide service to a (poss...
Denis Krivitski, Assaf Schuster, Ran Wolff
ELPUB
2004
ACM
14 years 3 months ago
The need for sharing user-profiles in digital libraries
Personalization was a hype in the late 1990s. Several organizations offered (and are still offering) personalization services for their customers. From ecommerce applications we...
Harald Krottmaier