Sciweavers

461 search results - page 80 / 93
» Protecting Transportation Infrastructure
Sort
View
CN
2006
79views more  CN 2006»
13 years 7 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
TPDS
2002
104views more  TPDS 2002»
13 years 7 months ago
Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach
The Internet is undergoing substantial changes from a communication and browsing infrastructure to a medium for conducting business and marketing a myriad of services. The World W...
Tarek F. Abdelzaher, Kang G. Shin, Nina T. Bhatti
ASPLOS
2011
ACM
12 years 11 months ago
Mementos: system support for long-running computation on RFID-scale devices
Transiently powered computing devices such as RFID tags, kinetic energy harvesters, and smart cards typically rely on programs that complete a task under tight time constraints be...
Benjamin Ransford, Jacob Sorber, Kevin Fu
ICIP
2007
IEEE
14 years 9 months ago
Selective Streaming of Multi-View Video for Head-Tracking 3D Displays
We present a novel client-driven multi-view video streaming system that allows a user watch 3-D video interactively with significantly reduced bandwidth requirements by transmitti...
Engin Kurutepe, M. Reha Civanlar, A. Murat Tekalp
ISESE
2006
IEEE
14 years 1 months ago
An industrial case study of structural testing applied to safety-critical embedded software
Effective testing of safety-critical real-time embedded software is difficult and expensive. Many companies are hesitant about the cost of formalized criteria-based testing and a...
Jing Guan, Jeff Offutt, Paul Ammann