Sciweavers

398 search results - page 74 / 80
» Some Analysis in Distributed MIMO Systems
Sort
View
IOR
2002
135views more  IOR 2002»
13 years 7 months ago
A Fluid Heuristic for Minimizing Makespan in Job Shops
We describe a simple on-line heuristic for scheduling job-shops. We assume there is a fixed set of routes for the jobs, and many jobs, say N, on each route. The heuristic uses saf...
J. G. Dai, Gideon Weiss
SIGSOFT
2003
ACM
14 years 8 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
CIVR
2008
Springer
165views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Balancing thread based navigation for targeted video search
Various query methods for video search exist. Because of the semantic gap each method has its limitations. We argue that for effective retrieval query methods need to be combined ...
Ork de Rooij, Cees G. M. Snoek, Marcel Worring
COMCOM
2008
80views more  COMCOM 2008»
13 years 7 months ago
Robust video-on-demand streaming in peer-to-peer environments
This paper presents a new video-on-demand streaming technique in peer-to-peer (P2P) environments. While a number of P2P live video streaming techniques have been proposed in the p...
Tai T. Do, Kien A. Hua, Mounir A. Tantaoui
CN
2008
100views more  CN 2008»
13 years 7 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell