Sciweavers

638 search results - page 74 / 128
» Efficient Testing of High Performance Transaction Processing...
Sort
View
ICASSP
2008
IEEE
15 years 4 months ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu
CIKM
2005
Springer
15 years 3 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
ICCV
2007
IEEE
15 years 11 months ago
A Biologically Inspired System for Action Recognition
We present a biologically-motivated system for the recognition of actions from video sequences. The approach builds on recent work on object recognition based on hierarchical feed...
Hueihan Jhuang, Thomas Serre, Lior Wolf, Tomaso Po...
TC
2008
14 years 9 months ago
Exploiting In-Memory and On-Disk Redundancy to Conserve Energy in Storage Systems
Abstract--Today's storage systems place an imperative demand on energy efficiency. A storage system often places single-rotationrate disks into standby mode by stopping them f...
Jun Wang, Xiaoyu Yao, Huijun Zhu
EUROSYS
2006
ACM
15 years 6 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...