Sciweavers

4359 search results - page 872 / 872
» Designing learning systems to provide accessible services
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 9 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
RAS
2007
138views more  RAS 2007»
13 years 5 months ago
Image-based robot navigation from an image memory
This paper addresses the problem of vision-based navigation and proposes an original control law to perform such navigation. The overall approach is based on an appearance-based r...
Anthony Remazeilles, François Chaumette
PLDI
2005
ACM
13 years 11 months ago
Pin: building customized program analysis tools with dynamic instrumentation
Robust and powerful software instrumentation tools are essential for program analysis tasks such as profiling, performance evaluation, and bug detection. To meet this need, we ha...
Chi-Keung Luk, Robert S. Cohn, Robert Muth, Harish...
HPDC
2012
IEEE
11 years 8 months ago
vSlicer: latency-aware virtual machine scheduling via differentiated-frequency CPU slicing
Recent advances in virtualization technologies have made it feasible to host multiple virtual machines (VMs) in the same physical host and even the same CPU core, with fair share ...
Cong Xu, Sahan Gamage, Pawan N. Rao, Ardalan Kanga...