Sciweavers

571 search results - page 114 / 115
» From Control Flow to Dataflow
Sort
View
119
Voted
TWC
2008
140views more  TWC 2008»
15 years 2 months ago
Exclusive-Region Based Scheduling Algorithms for UWB WPAN
With the capability of supporting very high data rate services in a short range, Ultra-Wideband (UWB) technology is appealing to multimedia applications in future wireless personal...
Kuang-Hao Liu, Lin Cai, Xuemin Shen
125
Voted
TOG
2008
137views more  TOG 2008»
15 years 1 months ago
A layered, heterogeneous reflectance model for acquiring and rendering human skin
We introduce a layered, heterogeneous spectral reflectance model for human skin. The model captures the inter-scattering of light among layers, each of which may have an independe...
Craig Donner, Tim Weyrich, Eugene d'Eon, Ravi Rama...
131
Voted
ICISS
2010
Springer
15 years 17 days ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
119
Voted
IMC
2010
ACM
15 years 16 days ago
Improving content delivery using provider-aided distance information
Content delivery systems constitute a major portion of today's Internet traffic. While they are a good source of revenue for Internet Service Providers (ISPs), the huge volum...
Ingmar Poese, Benjamin Frank, Bernhard Ager, Georg...
108
Voted
IEEESCC
2009
IEEE
15 years 9 days ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...