Sciweavers

2726 search results - page 427 / 546
» Application security support in the operating system kernel
Sort
View
IMC
2006
ACM
15 years 11 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
OOPSLA
2007
Springer
15 years 11 months ago
Transactions with isolation and cooperation
We present the TIC (Transactions with Isolation and Cooperation) model for concurrent programming. TIC adds to standard transactional memory the ability for a transaction to obser...
Yannis Smaragdakis, Anthony Kay, Reimer Behrends, ...
MM
2010
ACM
252views Multimedia» more  MM 2010»
15 years 5 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
DSN
2008
IEEE
15 years 11 months ago
Toward an understanding of the processing delay of peer-to-peer relay nodes
Abstract—Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not ...
Kuan-Ta Chen, Jing-Kai Lou
CGF
2006
111views more  CGF 2006»
15 years 5 months ago
Efficient Large Scale Acquisition of Building Interiors
We describe a system for the rapid acquisition of building interiors. In 40 hours, a two member team with a single acquisition device captured a model of the corridors and 20 indi...
Gleb Bahmutov, Voicu Popescu, Mihai Mudure