Sciweavers

1809 search results - page 260 / 362
» Weakly Computable Real Numbers
Sort
View
CLUSTER
1999
IEEE
13 years 8 months ago
Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement real time cryptographic services. In this paper we evaluate the use of software b...
Aura Ganz, Se Hyun Park, Zvi Ganz
INFOCOM
2010
IEEE
13 years 7 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...
ERSHOV
2009
Springer
13 years 6 months ago
Applicability of the BLAST Model Checker: An Industrial Case Study
Model checking of software has been a very active research topic recently. As a result, a number of software model checkers have been developed for analysis of software written in ...
Emanuel Kolb, Ondrej Sery, Roland Weiss
IC
2009
13 years 6 months ago
Language Based Crawling: Crawling the Arabic Content of the Web
- Crawling web pages written in Arabic or any other language with limited content in the web may, at first, seem to parallel the process of crawling the English content. However, t...
Saad H. Alabbad, Sultan Alanazi
CVPR
2011
IEEE
13 years 5 months ago
Scale and Rotation Invariant Matching Using Linearly Augmented Trees
We propose a novel linearly augmented tree method for efficient scale and rotation invariant object matching. The proposed method enforces pairwise matching consistency defined ...
Hao Jiang, Tai-Peng Tian, Stan Sclaroff