Sciweavers

871 search results - page 72 / 175
» Data Recovery from Distributed Personal Repositories
Sort
View
94
Voted
CVIU
2008
151views more  CVIU 2008»
15 years 21 days ago
Accurate and precise 2D-3D registration based on X-ray intensity
This paper addresses the problem of estimating the 3D rigid pose of an object from its digitized X-ray projection. We considered the cases of homogeneous (CAD models) and inhomoge...
Souha Aouadi, Laurent Sarry
84
Voted
SOSP
2001
ACM
15 years 9 months ago
Resilient Overlay Networks
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance with...
David G. Andersen, Hari Balakrishnan, M. Frans Kaa...
118
Voted
CCS
2008
ACM
15 years 2 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
118
Voted
CONEXT
2009
ACM
15 years 1 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
SIGCOMM
2006
ACM
15 years 6 months ago
A measurement study on the impact of routing events on end-to-end internet path performance
Extensive measurement studies have shown that end-to-end Internet path performance degradation is correlated with routing dynamics. However, the root cause of the correlation betw...
Feng Wang, Zhuoqing Morley Mao, Jia Wang, Lixin Ga...