Sciweavers

6660 search results - page 1157 / 1332
» Data Analysis for Query Processing
Sort
View
GLOBECOM
2008
IEEE
15 years 9 months ago
Networked Embedded Systems: A Quantitative Performance Comparison
— Networked embedded systems are gaining more and more attention and their use in current network scenarios is of indisputable importance. Research community and industry are pro...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
15 years 9 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
15 years 9 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen
CIVR
2007
Springer
154views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Representing shape with a spatial pyramid kernel
The objective of this paper is classifying images by the object categories they contain, for example motorbikes or dolphins. There are three areas of novelty. First, we introduce ...
Anna Bosch, Andrew Zisserman, Xavier Muñoz
112
Voted
LPAR
2007
Springer
15 years 9 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
« Prev « First page 1157 / 1332 Last » Next »