Sciweavers

30570 search results - page 6072 / 6114
» An Image Data Model
Sort
View
APLAS
2010
ACM
15 years 1 days ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
BPM
2010
Springer
128views Business» more  BPM 2010»
15 years 19 hour ago
Content-Aware Resolution Sequence Mining for Ticket Routing
Ticket routing is key to the efficiency of IT problem management. Due to the complexity of many reported problems, problem tickets typically need to be routed among various expert ...
Peng Sun, Shu Tao, Xifeng Yan, Nikos Anerousis, Yi...
SIGCOMM
2010
ACM
15 years 17 hour ago
Topology-aware resource allocation for data-intensive workloads
This paper proposes an architecture for optimized resource allocation in Infrastructure-as-a-Service (IaaS)-based cloud systems. Current IaaS systems are usually unaware of the ho...
Gunho Lee, Niraj Tolia, Parthasarathy Ranganathan,...
SOUPS
2010
ACM
15 years 15 hour ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
ECCV
2010
Springer
15 years 11 hour ago
Efficient Computation of Scale-Space Features for Deformable Shape Correspondences
Abstract. With the rapid development of fast data acquisition techniques, 3D scans that record the geometric and photometric information of deformable objects are routinely acquire...
Tingbo Hou, Hong Qin
« Prev « First page 6072 / 6114 Last » Next »