Sciweavers

8655 search results - page 471 / 1731
» Challenges for Trusted Computing
Sort
View
ASPLOS
2012
ACM
14 years 9 days ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
ICCV
2007
IEEE
16 years 6 months ago
Moving Object Extraction with a Hand-held Camera
This paper presents a new method to detect and accurately extract the moving object from a video sequence taken by a hand-held camera. In order to extract the high quality moving ...
Guofeng Zhang, Jiaya Jia, Wei Xiong, Tien-Tsin Won...
CHI
2010
ACM
15 years 11 months ago
Bridging the gap: moving from contextual analysis to design
A typical product development lifecycle for interactive systems starts with contextual analysis to guide system design. The challenge however is in transitioning from findings abo...
Tejinder K. Judge, Carman Neustaedter, Anthony Tan...
126
Voted
IEEESCC
2008
IEEE
15 years 11 months ago
Built-to-Order Service Engineering for Enterprise IT Discovery
Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected...
Nikolai Joukov, Murthy V. Devarakonda, Kostas Mago...
DAC
2006
ACM
15 years 10 months ago
Design in reliability for communication designs
Silicon design implementation has become increasingly complex with the deep submicron technologies such as 90nm and below. It is common to see multiple processor cores, several ty...
Uday Reddy Bandi, Murty Dasaka, Pavan K. Kumar