Sciweavers

502 search results - page 87 / 101
» On the Practical Performance of Rateless Codes
Sort
View
PLDI
2006
ACM
14 years 1 months ago
Automatic instruction scheduler retargeting by reverse-engineering
In order to generate high-quality code for modern processors, a compiler must aggressively schedule instructions, maximizing resource utilization for execution efficiency. For a ...
Matthew J. Bridges, Neil Vachharajani, Guilherme O...
DSN
2003
IEEE
14 years 20 days ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
DGO
2008
112views Education» more  DGO 2008»
13 years 8 months ago
Relating taxonomies with regulations
Increasingly, taxonomies are being developed for a wide variety of industrial domains and specific applications within those domains. These industry or application specific taxono...
Chin Pang Cheng, Jiayi Pan, Gloria T. Lau, Kincho ...
TMC
2011
151views more  TMC 2011»
13 years 2 months ago
Flexible Broadcasting of Scalable Video Streams to Heterogeneous Mobile Devices
—We study the scalable video broadcasting problem in mobile TV broadcast networks, where each TV channel is encoded into a scalable video stream with multiple layers, and several...
Cheng-Hsin Hsu, Mohamed Hefeeda
ESAS
2004
Springer
14 years 23 days ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar