Sciweavers

15635 search results - page 3030 / 3127
» Modelling and Design of VAML
Sort
View
MOBISYS
2010
ACM
15 years 6 months ago
Augmenting mobile 3G using WiFi
We investigate if WiFi access can be used to augment 3G capacity in mobile environments. We first conduct a detailed study of 3G and WiFi access from moving vehicles, in three dif...
Aruna Balasubramanian, Ratul Mahajan, Arun Venkata...
ISI
2008
Springer
15 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
TOOLS
1999
IEEE
15 years 8 months ago
Employing Object Technology to Expose Fundamental Object Concepts
This paper reports on the utilisation of object technology in a university-level course on software development, specifically designed for distance learning, and now enrolling ove...
Mark Woodman, Robert Griffiths, Simon Holland, Hug...
DAC
1998
ACM
15 years 8 months ago
A Tool for Performance Estimation of Networked Embedded End-systems
Networked embedded systems are expected to support adaptive streaming audio/video applications with soft real-time constraints. These systems can be designed in a cost efficient ...
Asawaree Kalavade, Pratyush Moghé
186
Voted
MM
1998
ACM
150views Multimedia» more  MM 1998»
15 years 8 months ago
Zodiac: A History-Based Interactive Video Authoring System
Easy-to-use audio/video authoring tools play a crucial role in moving multimedia software from research curiosity to mainstream applications. However, research in multimedia author...
Tzi-cker Chiueh, Tulika Mitra, Anindya Neogi, Chua...
« Prev « First page 3030 / 3127 Last » Next »