Sciweavers

20745 search results - page 3909 / 4149
» Computer graphics for all
Sort
View
MUE
2009
IEEE
252views Multimedia» more  MUE 2009»
15 years 5 months ago
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis
As modern life becomes increasingly closely bound to the Internet, network security becomes increasingly important. Like it or not, we all live under the shadow of network threats...
Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan
ICRA
2009
IEEE
178views Robotics» more  ICRA 2009»
15 years 5 months ago
Camera self-calibration for sequential Bayesian structure from motion
— Computer vision researchers have proved the feasibility of camera self-calibration —the estimation of a camera’s internal parameters from an image sequence without any know...
Javier Civera, Diana R. Bueno, Andrew J. Davison, ...
ICTAI
2009
IEEE
15 years 5 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
IEEEPACT
2009
IEEE
15 years 5 months ago
Using Aggressor Thread Information to Improve Shared Cache Management for CMPs
—Shared cache allocation policies play an important role in determining CMP performance. The simplest policy, LRU, allocates cache implicitly as a consequence of its replacement ...
Wanli Liu, Donald Yeung
IEEEPACT
2009
IEEE
15 years 5 months ago
Quantifying the Potential of Program Analysis Peripherals
Abstract—As programmers are asked to manage more complicated parallel machines, it is likely that they will become increasingly dependent on tools such as multi-threaded data rac...
Mohit Tiwari, Shashidhar Mysore, Timothy Sherwood
« Prev « First page 3909 / 4149 Last » Next »