Sciweavers

24188 search results - page 4793 / 4838
» Computing on Encrypted Data
Sort
View
IJCV
2006
299views more  IJCV 2006»
14 years 10 months ago
Graph Cuts and Efficient N-D Image Segmentation
Combinatorial graph cut algorithms have been successfully applied to a wide range of problems in vision and graphics. This paper focusses on possibly the simplest application of gr...
Yuri Boykov, Gareth Funka-Lea
IJDE
2006
95views more  IJDE 2006»
14 years 10 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ITIIS
2008
151views more  ITIIS 2008»
14 years 10 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
JACM
2008
91views more  JACM 2008»
14 years 10 months ago
On the minimization of XPath queries
XML queries are usually expressed by means of XPath expressions identifying portions of the selected documents. An XPath expression defines a way of navigating an XML tree and ret...
Sergio Flesca, Filippo Furfaro, Elio Masciari
CORR
2007
Springer
146views Education» more  CORR 2007»
14 years 10 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...
« Prev « First page 4793 / 4838 Last » Next »