Sciweavers

628 search results - page 51 / 126
» Effectively Open Real Functions
Sort
View
103
Voted
WWW
2006
ACM
16 years 4 months ago
Detecting semantic cloaking on the web
By supplying different versions of a web page to search engines and to browsers, a content provider attempts to cloak the real content from the view of the search engine. Semantic...
Baoning Wu, Brian D. Davison
SIGMOD
2002
ACM
219views Database» more  SIGMOD 2002»
16 years 3 months ago
Efficient k-NN search on vertically decomposed data
Applications like multimedia retrieval require efficient support for similarity search on large data collections. Yet, nearest neighbor search is a difficult problem in high dimen...
Arjen P. de Vries, Nikos Mamoulis, Niels Nes, Mart...
141
Voted
RTCSA
2009
IEEE
15 years 10 months ago
Bounding the Maximum Length of Non-preemptive Regions under Fixed Priority Scheduling
The question whether preemptive systems are better than non-preemptive systems has been debated for a long time, but only partial answers have been provided in the real-time liter...
Gang Yao, Giorgio C. Buttazzo, Marko Bertogna
145
Voted
ACCV
2007
Springer
15 years 7 months ago
Feature Management for Efficient Camera Tracking
In dynamic scenes with occluding objects many features need to be tracked for a robust real-time camera pose estimation. An open problem is that tracking too many features has a ne...
Harald Wuest, Alain Pagani, Didier Stricker
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer