Sciweavers

571 search results - page 68 / 115
» From Control Flow to Dataflow
Sort
View
ICIP
2003
IEEE
14 years 10 months ago
Rate-distortion optimized on-demand media streaming with server diversity
This paper studies the streaming of packetized media from multiple servers to a client over a lossy network. In particular, we propose a client-driven rate-distortion optimal pack...
Ali C. Begen, Yucel Altunbasak, Mehmet A. Begen
FC
1998
Springer
83views Cryptology» more  FC 1998»
14 years 28 days ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
AI50
2006
14 years 14 days ago
Development Via Information Self-structuring of Sensorimotor Experience and Interaction
actvoid.se Abstract. We describe how current work in Artificial Intelligence is using rigorous tools from information theory, namely information distance and experience distance to...
Chrystopher L. Nehaniv, Naeem Assif Mirza, Lars Ol...
POPL
2009
ACM
14 years 9 months ago
The theory of deadlock avoidance via discrete control
Deadlock in multithreaded programs is an increasingly important problem as ubiquitous multicore architectures force parallelization upon an ever wider range of software. This pape...
Manjunath Kudlur, Scott A. Mahlke, Stéphane...
SACMAT
2009
ACM
14 years 3 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang