Sciweavers

22193 search results - page 4142 / 4439
» Multiple Restricted Multiplication
Sort
View
AIME
2005
Springer
15 years 6 months ago
EORCA: A Collaborative Activities Representation for Building Guidelines from Field Observations
In the objective of building care team guidelines from field observations, this paper introduces a representation method for describing the medical collaborative activities during ...
Liliane Pellegrin, Nathalie Bonnardel, Franç...
ASPLOS
2006
ACM
15 years 6 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
CASES
2005
ACM
15 years 6 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
ICDCS
2010
IEEE
15 years 5 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
CLOR
2006
15 years 5 months ago
An Implicit Shape Model for Combined Object Categorization and Segmentation
We present a method for object categorization in real-world scenes. Following a common consensus in the field, we do not assume that a figure-ground segmentation is available prior...
Bastian Leibe, Ales Leonardis, Bernt Schiele
« Prev « First page 4142 / 4439 Last » Next »