Sciweavers

6289 search results - page 1234 / 1258
» Error Sequence Analysis
Sort
View
SASN
2003
ACM
15 years 5 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning
VRST
2003
ACM
15 years 5 months ago
Time-critical collision detection using an average-case approach
We present a novel, generic framework and algorithm for hierarchical collision detection, which allows an application to balance speed and quality of the collision detection. We p...
Jan Klein, Gabriel Zachmann
CCS
2003
ACM
15 years 5 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...
CIVR
2003
Springer
200views Image Analysis» more  CIVR 2003»
15 years 5 months ago
Multimedia Search with Pseudo-relevance Feedback
We present an algorithm for video retrieval that fuses the decisions of multiple retrieval agents in both text and image modalities. While the normalization and combination of evi...
Rong Yan, Alexander G. Hauptmann, Rong Jin
PLDI
2010
ACM
15 years 4 months ago
Adversarial memory for detecting destructive races
Multithreaded programs are notoriously prone to race conditions, a problem exacerbated by the widespread adoption of multi-core processors with complex memory models and cache coh...
Cormac Flanagan, Stephen N. Freund
« Prev « First page 1234 / 1258 Last » Next »