Sciweavers

3008 search results - page 142 / 602
» Mechanisms for Importing Modules
Sort
View
ICC
2007
IEEE
218views Communications» more  ICC 2007»
15 years 10 months ago
Utility-Based Resource Allocation for Layer-Encoded IPTV Multicast in IEEE 802.16 (WiMAX) Wireless Networks
In this paper, we propose a utility-based resource allocation scheme for layer-encoded IPTV multicast streaming service over IEEE 802.16 WiMAX networks. Unlike existing utility-bas...
Wen-Hsing Kuo, Tehuang Liu, Wanjiun Liao
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
15 years 10 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
AINA
2003
IEEE
15 years 9 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung
SYSTOR
2010
ACM
15 years 9 months ago
Design and implementation of a generic resource sharing virtual time dispatcher
Virtual machine monitors, especially when used for server consolidation, need to enforce a predefined sharing of resources among the running virtual machines. We propose a new me...
Tal Ben-Nun, Yoav Etsion, Dror G. Feitelson
CCS
2001
ACM
15 years 9 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah