Sciweavers

153 search results - page 30 / 31
» An experimental analysis of the effect of the operating syst...
Sort
View
ACSAC
2010
IEEE
13 years 3 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
RAID
1999
Springer
13 years 9 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
GECCO
2006
Springer
179views Optimization» more  GECCO 2006»
13 years 9 months ago
Parisian evolution with honeybees for three-dimensional reconstruction
This paper introduces a novel analogy with the way in which honeybee colonies operate in order to solve the problem of sparse and quasi dense reconstruction. To successfully solve...
Gustavo Olague, Cesar Puente
MM
2004
ACM
178views Multimedia» more  MM 2004»
13 years 10 months ago
A bootstrapping framework for annotating and retrieving WWW images
Most current image retrieval systems and commercial search engines use mainly text annotations to index and retrieve WWW images. This research explores the use of machine learning...
HuaMin Feng, Rui Shi, Tat-Seng Chua
DSN
2011
IEEE
12 years 5 months ago
Transparent dynamic binding with fault-tolerant cache coherence protocol for chip multiprocessors
—Aggressive technology scaling causes chip multiprocessors increasingly error-prone. Core-level faulttolerant approaches bind two cores to implement redundant execution and error...
Shuchang Shan, Yu Hu, Xiaowei Li