Sciweavers

2421 search results - page 459 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
122
Voted
IPTPS
2005
Springer
15 years 9 months ago
Evaluating DHT-Based Service Placement for Stream-Based Overlays
Stream-based overlay networks (SBONs) are one approach to implementing large-scale stream processing systems. A fundamental consideration in an SBON is that of service placement, ...
Peter R. Pietzuch, Jeffrey Shneidman, Jonathan Led...
140
Voted
LISA
2007
15 years 6 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
140
Voted
DAGSTUHL
2010
15 years 5 months ago
Generalized Hyper-cylinders: a Mechanism for Modeling and Visualizing N-D Objects
The display of surfaces and solids has usually been restricted to the domain of scientific visualization; however, little work has been done on the visualization of surfaces and s...
Matthew O. Ward, Zhenyu Guo
115
Voted
ICPR
2010
IEEE
15 years 1 months ago
Patch-Based Similarity HMMs for Face Recognition with a Single Reference Image
In this paper we present a new architecture for face recognition with a single reference image, which completely separates the training process from the recognition process. In th...
Ngoc-Son Vu, Alice Caplier
POPL
2011
ACM
14 years 6 months ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen