Sciweavers

43264 search results - page 8274 / 8653
» Comparing models of computation
Sort
View
129
Voted
MM
2010
ACM
192views Multimedia» more  MM 2010»
15 years 3 months ago
iLike: integrating visual and textual features for vertical search
Content-based image search on the Internet is a challenging problem, mostly due to the semantic gap between low-level visual features and high-level content, as well as the excess...
Yuxin Chen, Nenghai Yu, Bo Luo, Xue-wen Chen
ECRTS
2010
IEEE
15 years 3 months ago
On Schedulability Analysis of Non-cyclic Generalized Multiframe Tasks
— The generalized multiframe (GMF) task has been proposed to model a task whose execution times, deadlines and minimum separation times are changed according to a specified patte...
Noel Tchidjo Moyo, Eric Nicollet, Frederic Lafaye,...
SIGCOMM
2010
ACM
15 years 3 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
137
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 3 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
« Prev « First page 8274 / 8653 Last » Next »