Sciweavers

4604 search results - page 920 / 921
» Analysis of Negotiation Dynamics
Sort
View
BIRTHDAY
2011
Springer
12 years 5 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
CCS
2011
ACM
12 years 5 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
ICDCN
2012
Springer
12 years 25 days ago
Economic Models for Cloud Service Markets
Cloud computing is a paradigm that has the potential to transform and revolutionalize the next generation IT industry by making software available to end-users as a service. A clou...
Ranjan Pal, Pan Hui
CVPR
2012
IEEE
11 years 10 months ago
Foreground Detection Using Spatiotemporal Projection Kernels
Foreground detection is at the core of many video processing tasks. In this paper, we propose a novel video foreground detection method that exploits the statistics of 3D space-tim...
Y. Moshe, H. Hel-Or, and Y. Hel-Or
SIGMOD
2012
ACM
203views Database» more  SIGMOD 2012»
11 years 7 months ago
Optimizing index for taxonomy keyword search
Query substitution is an important problem in information retrieval. Much work focuses on how to find substitutes for any given query. In this paper, we study how to efficiently ...
Bolin Ding, Haixun Wang, Ruoming Jin, Jiawei Han, ...