Sciweavers

338 search results - page 26 / 68
» Multicasting a Changing Repository
Sort
View
INFOCOM
1999
IEEE
14 years 22 days ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...
CSMR
2009
IEEE
14 years 3 months ago
Structural Complexity and Decay in FLOSS Systems: An Inter-repository Study
Past software engineering literature has firmly established that software architectures and the associated code decay over time. Architectural decay is, potentially, a major issu...
Andrea Capiluppi, Karl Beecher
ICC
2009
IEEE
127views Communications» more  ICC 2009»
14 years 3 months ago
Utility-Based User Grouping and Bandwidth Allocation for Wireless Multicast Systems
Abstract—With the proliferation of wireless multimedia applications, multicast/broadcast has been recognized as an efficient technique to transmit a large volume of data to mult...
Juan Liu, Wei Chen, Zhigang Cao, Ying Jun Zhang, S...
GLOBECOM
2008
IEEE
14 years 2 months ago
Asymptotic Throughput in Wireless Multicast OFDM Systems
Abstract—With the proliferation of wireless multimedia applications, multicast/broadcast has been recognized as an efficient technique to transmit a large volume of data to mult...
Juan Liu, Wei Chen, Zhigang Cao, Ying Jun Zhang, S...
ECLIPSE
2007
ACM
14 years 11 days ago
Predicting buggy changes inside an integrated development environment
We present a tool that predicts whether the software under development inside an IDE has a bug. An IDE plugin performs this prediction, using the Change Classification technique t...
Janaki T. Madhavan, E. James Whitehead Jr.