Sciweavers

155 search results - page 21 / 31
» Flexible Aliasing with Protection
Sort
View
TOOLS
2008
IEEE
14 years 2 months ago
Ownership, Uniqueness, and Immutability
Programming in an object-oriented language demands a fine balance between high degrees of expressiveness and control. At one level, we need to permit objects to interact freely t...
Johan Östlund, Tobias Wrigstad, Dave Clarke, ...
VTC
2007
IEEE
112views Communications» more  VTC 2007»
14 years 1 months ago
Unequal Importance Image Communication over Heterogeneous Networks
An unequal importance communication approach, for reliable and real-time image communication over heterogeneous networks and its applications in mobile communication systems is pre...
Mehdi Malboubi, Ahmad Bahai, Mustafa Ergen, Pravin...
VTS
2007
IEEE
203views Hardware» more  VTS 2007»
14 years 1 months ago
Multiple Bit Upset Tolerant Memory Using a Selective Cycle Avoidance Based SEC-DED-DAEC Code
Conventional error correcting code (ECC) schemes used in memories and caches cannot correct double bit errors caused by a single event upset (SEU). As memory density increases, mu...
Avijit Dutta, Nur A. Touba
CEAS
2007
Springer
14 years 1 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton
MIDDLEWARE
2007
Springer
14 years 1 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt