Sciweavers

2250 search results - page 440 / 450
» Authorizing applications in singularity
Sort
View
ACSAC
2010
IEEE
14 years 12 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
121
Voted
ICIP
2010
IEEE
14 years 11 months ago
Occlusion handling based on support and decision
This paper proposes a novel method for handling occluded pixels in stereo images based on a probabilistic voting framework that utilizes a novel support-and-decision process. Occl...
Dong Bo Min, Sehoon Yea, Anthony Vetro
ICIP
2010
IEEE
14 years 11 months ago
Direction-adaptive transforms for coding prediction residuals
In this paper, we present 2-D direction-adaptive transforms for coding prediction residuals of video. These Direction-Adaptive Residual Transforms (DART) are shown to be more effe...
Robert A. Cohen, Sven Klomp, Anthony Vetro, Huifan...
121
Voted
IMC
2010
ACM
14 years 11 months ago
On the characteristics and reasons of long-lived internet flows
Prior studies of Internet traffic have considered traffic at different resolutions and time scales: packets and flows for hours or days, aggregate packet statistics for days or we...
Lin Quan, John Heidemann
133
Voted
PPDP
2010
Springer
14 years 11 months ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch