Sciweavers

2756 search results - page 418 / 552
» Computation-Centric Memory Models
Sort
View
CACM
2010
121views more  CACM 2010»
15 years 1 months ago
Goldilocks: a race-aware Java runtime
We present Goldilocks, a Java runtime that monitors program executions and throws a DataRaceException when a data race is about to occur. This prevents racy accesses from taking p...
Tayfun Elmas, Shaz Qadeer, Serdar Tasiran
140
Voted

Publication
145views
15 years 3 days ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
TCSV
2011
14 years 11 months ago
Mixture of Gaussians-Based Background Subtraction for Bayer-Pattern Image Sequences
This paper proposes a background subtraction method for Bayer-pattern image sequences. The proposed method models the background in a Bayer-pattern domain using a mixture of Gauss...
Jae Kyu Suhr, Ho Gi Jung, Gen Li, Jaihie Kim
172
Voted
JCIT
2010
148views more  JCIT 2010»
14 years 10 months ago
Investigating the Performance of Naive- Bayes Classifiers and K- Nearest Neighbor Classifiers
Probability theory is the framework for making decision under uncertainty. In classification, Bayes' rule is used to calculate the probabilities of the classes and it is a bi...
Mohammed J. Islam, Q. M. Jonathan Wu, Majid Ahmadi...
SOSYM
2010
119views more  SOSYM 2010»
14 years 10 months ago
Formal specification of non-functional properties of component-based software systems
Component-based software engineering (CBSE) is viewed as an opportunity to deal with the increasing complexity of modern-day software. Along with CBSE comes the notion of component...
Steffen Zschaler