Sciweavers

8655 search results - page 383 / 1731
» Challenges for Trusted Computing
Sort
View
ICPR
2000
IEEE
15 years 8 months ago
From Video Shot Clustering to Sequence Segmentation
Automatically building high-level segments to structure information in video documents is a challenging task. This paper presents a method based on the cophenetic criterion, a dis...
Emmanuel Veneau, Rémi Ronfard, Patrick Bout...
132
Voted
LATIN
1998
Springer
15 years 8 months ago
Shape Reconstruction with Delaunay Complex
The reconstruction of a shape or surface from a finite set of points is a practically significant and theoretically challenging problem. This paper presents a unified view of algor...
Herbert Edelsbrunner
CLOUDCOM
2010
Springer
15 years 1 months ago
Performing Large Science Experiments on Azure: Pitfalls and Solutions
Carrying out science at extreme scale is the next generational challenge facing the broad field of scientific research. Cloud computing offers to potential for an increasing number...
Wei Lu, Jared Jackson, Jaliya Ekanayake, Roger S. ...
OSDI
2008
ACM
16 years 4 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
135
Voted
EUROSYS
2008
ACM
16 years 28 days ago
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide me...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...