Sciweavers

796 search results - page 107 / 160
» Spoofing prevention method
Sort
View
ICSM
2005
IEEE
14 years 3 months ago
Object-Oriented Reengineering: Patterns and Techniques
Surprising as it may seem, many of the early adopters of the object-oriented paradigm already face a number of problems typically encountered in large-scale legacy systems. Softwa...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
ISCAS
2005
IEEE
154views Hardware» more  ISCAS 2005»
14 years 3 months ago
Fast 802.11 link adaptation for real-time video streaming by cross-layer signaling
Abstract— The quality of real-time video streaming over wireless links is significantly reduced due to packet losses and delays caused by rapid changes of the link conditions. W...
Ivaylo Haratcherev, Jacco R. Taal, Koen Langendoen...
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
14 years 3 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 3 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
14 years 3 months ago
An autonomous explore/exploit strategy
In reinforcement learning problems it has been considered that neither exploitation nor exploration can be pursued exclusively without failing at the task. The optimal balance bet...
Alex McMahon, Dan Scott, William N. L. Browne