Sciweavers

11603 search results - page 2236 / 2321
» Embedded System Security
Sort
View
127
Voted
FAST
2009
15 years 16 days ago
Enabling Transactional File Access via Lightweight Kernel Extensions
Transactions offer a powerful data-access method used in many databases today trough a specialized query API. User applications, however, use a different fileaccess API (POSIX) wh...
Richard P. Spillane, Sachin Gaikwad, Manjunath Chi...
152
Voted
ASPLOS
2012
ACM
13 years 10 months ago
Comprehensive kernel instrumentation via dynamic binary translation
Dynamic binary translation (DBT) is a powerful technique that enables fine-grained monitoring and manipulation of an existing program binary. At the user level, it has been emplo...
Peter Feiner, Angela Demke Brown, Ashvin Goel
209
Voted
CVPR
2009
IEEE
1468views Computer Vision» more  CVPR 2009»
16 years 10 months ago
Hardware-Efficient Belief Propagation
Belief propagation (BP) is an effective algorithm for solving energy minimization problems in computer vision. However, it requires enormous memory, bandwidth, and computation beca...
Chao-Chung Cheng, Chia-Kai Liang, Homer H. Chen, L...
179
Voted
CVPR
2009
IEEE
16 years 10 months ago
Active Volume Models for 3D Medical Image Segmentation
In this paper, we propose a novel predictive model for object boundary, which can integrate information from any sources. The model is a dynamic “object” model whose manifes...
Tian Shen (Lehigh University), Hongsheng Li (Lehig...
246
Voted
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 4 months ago
Reasoning About Approximate Match Query Results
Join techniques deploying approximate match predicates are fundamental data cleaning operations. A variety of predicates have been utilized to quantify approximate match in such o...
Sudipto Guha, Nick Koudas, Divesh Srivastava, Xiao...
« Prev « First page 2236 / 2321 Last » Next »