Sciweavers

571 search results - page 114 / 115
» From Control Flow to Dataflow
Sort
View
TWC
2008
140views more  TWC 2008»
13 years 7 months ago
Exclusive-Region Based Scheduling Algorithms for UWB WPAN
With the capability of supporting very high data rate services in a short range, Ultra-Wideband (UWB) technology is appealing to multimedia applications in future wireless personal...
Kuang-Hao Liu, Lin Cai, Xuemin Shen
TOG
2008
137views more  TOG 2008»
13 years 5 months ago
A layered, heterogeneous reflectance model for acquiring and rendering human skin
We introduce a layered, heterogeneous spectral reflectance model for human skin. The model captures the inter-scattering of light among layers, each of which may have an independe...
Craig Donner, Tim Weyrich, Eugene d'Eon, Ravi Rama...
ICISS
2010
Springer
13 years 5 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
IMC
2010
ACM
13 years 5 months ago
Improving content delivery using provider-aided distance information
Content delivery systems constitute a major portion of today's Internet traffic. While they are a good source of revenue for Internet Service Providers (ISPs), the huge volum...
Ingmar Poese, Benjamin Frank, Bernhard Ager, Georg...
IEEESCC
2009
IEEE
13 years 5 months ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...