Sciweavers

22193 search results - page 4193 / 4439
» Multiple Restricted Multiplication
Sort
View
148
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
SIGCOMM
2010
ACM
15 years 3 months ago
The case for active device drivers
We revisit the device-driver architecture supported by the majority of operating systems, where a driver is a passive object that does not have its own thread of control and is on...
Leonid Ryzhyk, Yanjin Zhu, Gernot Heiser
147
Voted
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
15 years 3 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
136
Voted
WOSP
2010
ACM
15 years 3 months ago
Automatically improve software architecture models for performance, reliability, and cost using evolutionary algorithms
Quantitative prediction of quality properties (i.e. extrafunctional properties such as performance, reliability, and cost) of software architectures during design supports a syste...
Anne Martens, Heiko Koziolek, Steffen Becker, Ralf...
126
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Hiding information inside structured shapes
This paper describes a new technique for embedding a message within structured shapes. It is desired that my changes in the shape owing to the embedded message are invisible to a ...
Samarjit Das, Shantanu Rane, Anthony Vetro
« Prev « First page 4193 / 4439 Last » Next »