Sciweavers

1691 search results - page 212 / 339
» The Delayed k-Server Problem
Sort
View
IWSEC
2009
Springer
14 years 4 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
EICS
2009
ACM
14 years 4 months ago
GT/SD: performance and simplicity in a groupware toolkit
Many tools exist for developing real-time distributed groupware, but most of these tools focus primarily on the performance of the resulting system, or on simplifying the developm...
Brian de Alwis, Carl Gutwin, Saul Greenberg
CSMR
2008
IEEE
14 years 4 months ago
Aligning Software Maintenance to the Offshore Reality
With an ever-increasing amount of software in place, the importance and ubiquity of software maintenance is continuously growing. Another more recent trend is to “offshore” su...
Christian Seybold, Rudolf K. Keller
ICC
2008
IEEE
14 years 4 months ago
Normal Graphs for Downlink Multiuser MIMO Scheduling
—Inspired by the success of the low-density parity-check (LDPC) codes in the field of error-control coding, in this paper we propose transforming the downlink multiuser multiple-...
Jung-Chieh Chen, Cheng-Hsuan Wu, Chao-Kai Wen, Yao...
ICPP
2008
IEEE
14 years 4 months ago
Fast Source Switching for Gossip-Based Peer-to-Peer Streaming
In this paper we consider gossip-based Peer-to-Peer streaming applications where multiple sources exist and they work serially. More specifically, we tackle the problem of fast s...
Zhenhua Li, Jiannong Cao, Guihai Chen, Yan Liu