Sciweavers

1619 search results - page 266 / 324
» Important Moments in Systems and Control
Sort
View
LCN
2005
IEEE
14 years 2 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
QEST
2005
IEEE
14 years 2 months ago
Toward Picture-perfect Streaming on the Internet
Quality of service (QoS) in streaming of continuous media over the Internet is poor, which is partly due to variations in delays, bandwidth limitations, and packet losses. Althoug...
Alix L. H. Chow, Leana Golubchik, John C. S. Lui
RTSS
2005
IEEE
14 years 2 months ago
Load Balancing in Bounded-Latency Content Distribution
In this paper we present a balanced data replication scheme that provides real-time latency bounds on content retrieval in content distribution networks. Many network applications...
Chengdu Huang, Gang Zhou, Tarek F. Abdelzaher, San...
SEFM
2005
IEEE
14 years 2 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider
WACV
2005
IEEE
14 years 2 months ago
Requirements for Camera Calibration: Must Accuracy Come with a High Price?
While a large number of vision applications rely on the mapping between 3D scenes and their corresponding 2D camera images, the question that occurs to most researchers is what, i...
Wei Sun, Jeremy R. Cooperstock