Sciweavers

2114 search results - page 363 / 423
» Practical Approaches for Software Adaptation
Sort
View
ETT
2006
138views Education» more  ETT 2006»
13 years 7 months ago
Comparison of modified dual queue and EDCA for VoIP over IEEE 802.11 WLAN
The popular IEEE 802.11 WLAN today does not provide any quality-of-service (QoS) because of its contention-based channel access nature of the medium access control (MAC). Therefore...
Jeonggyun Yu, Sunghyun Choi
IACR
2011
86views more  IACR 2011»
12 years 7 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
WWW
2005
ACM
14 years 8 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham
VLSID
2004
IEEE
209views VLSI» more  VLSID 2004»
14 years 8 months ago
An Architecture for Motion Estimation in the Transform Domain
demanding algorithm of a video encoder. It is known that about 60% ~ 80% of the total computation time is consumed for motion estimation [1]. The second is its high impact on the v...
J. Lee, Narayanan Vijaykrishnan, Mary Jane Irwin, ...
MOBISYS
2004
ACM
14 years 7 months ago
A Mechanism for Host Mobility Management supporting Application Awareness
Many approaches exist today that address the issues that arise when a mobile node changes its point(s) of attachment to the Internet. Mobile IP takes care of host mobility at the ...
Arjan J. H. Peddemors, Hans Zandbelt, Mortaza S. B...