Sciweavers

1791 search results - page 127 / 359
» Behavioral Operations
Sort
View
OSDI
1996
ACM
15 years 5 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...
ISCAS
2002
IEEE
149views Hardware» more  ISCAS 2002»
15 years 9 months ago
Adaptive end-to-end optimization of mobile video streaming using QoS negotiation
Video streaming over wireless links is a non-trivial problem due to the large and frequent changes in the quality of the underlying radio channel combined with latency constraints...
Jacco R. Taal, Koen Langendoen, Arjen van der Scha...
USENIX
2007
15 years 6 months ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...
ICDCSW
2006
IEEE
15 years 10 months ago
Evaluation of Unstructured Overlay Maintenance Protocols under Churn
An overlay network is formed on top of – and generally independently from – the underlying physical computer network, by the peers (nodes) of a P2P system. The dynamics of pee...
Roberto Baldoni, Silvia Bonomi, Adriano Rippa, Leo...
249
Voted
ECCV
2010
Springer
15 years 9 months ago
Guided Image Filtering
Abstract. In this paper, we propose a novel type of explicit image filter - guided filter. Derived from a local linear model, the guided filter generates the filtering output b...