Sciweavers

556 search results - page 94 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
VECPAR
2004
Springer
15 years 5 months ago
PerWiz: A What-If Prediction Tool for Tuning Message Passing Programs
Abstract. This paper presents PerWiz, a performance prediction tool for improving the performance of message passing programs. PerWiz focuses on locating where a significant impro...
Fumihiko Ino, Yuki Kanbe, Masao Okita, Kenichi Hag...
ICASSP
2011
IEEE
14 years 3 months ago
Prediction of discrete cosine transformed coefficients in resized pixel blocks
Abstract— A hybrid model was developed to predict the zeroquantized discrete cosine transform (ZQDCT) coefficients for intra blocks in our previous work. However, the complicated...
Jin Li, Weiwei Chen, Moncef Gabbouj, Jarmo Takala,...
OTM
2007
Springer
15 years 5 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
OOPSLA
2009
Springer
15 years 6 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
95
Voted
RTCSA
2003
IEEE
15 years 5 months ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...