Sciweavers

2250 search results - page 440 / 450
» Authorizing applications in singularity
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
ICIP
2010
IEEE
14 years 7 months ago
Occlusion handling based on support and decision
This paper proposes a novel method for handling occluded pixels in stereo images based on a probabilistic voting framework that utilizes a novel support-and-decision process. Occl...
Dong Bo Min, Sehoon Yea, Anthony Vetro
ICIP
2010
IEEE
14 years 7 months ago
Direction-adaptive transforms for coding prediction residuals
In this paper, we present 2-D direction-adaptive transforms for coding prediction residuals of video. These Direction-Adaptive Residual Transforms (DART) are shown to be more effe...
Robert A. Cohen, Sven Klomp, Anthony Vetro, Huifan...
IMC
2010
ACM
14 years 7 months ago
On the characteristics and reasons of long-lived internet flows
Prior studies of Internet traffic have considered traffic at different resolutions and time scales: packets and flows for hours or days, aggregate packet statistics for days or we...
Lin Quan, John Heidemann
PPDP
2010
Springer
14 years 7 months ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch