Sciweavers

17951 search results - page 3412 / 3591
» Network Coding Applications
Sort
View
ACSAC
2010
IEEE
15 years 18 days ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
128
Voted
BMVC
2010
15 years 18 days ago
Toward Robust Action Retrieval in Video
Retrieving human actions from video databases is a paramount but challenging task in computer vision. In this work, we develop such a framework for robustly recognizing human acti...
Samy Bakheet, Ayoub Al-Hamadi, Bernd Michaelis, Us...
127
Voted
FSTTCS
2010
Springer
15 years 17 days ago
Minimizing Busy Time in Multiple Machine Real-time Scheduling
We consider the following fundamental scheduling problem. The input consists of n jobs to be scheduled on a set of machines of bounded capacities. Each job is associated with a re...
Rohit Khandekar, Baruch Schieber, Hadas Shachnai, ...
130
Voted
GLOBECOM
2010
IEEE
15 years 16 days ago
Assessing the Impact of Geographically Correlated Failures on Overlay-Based Data Dissemination
Abstract--This paper addresses reliability of data dissemination applications when there are severe disruptions to the underlying physical infrastructure. Such massive simultaneous...
Kyungbaek Kim, Nalini Venkatasubramanian
INFOCOM
2010
IEEE
15 years 14 days ago
Surfing the Blogosphere: Optimal Personalized Strategies for Searching the Web
We propose a distributed mechanism for finding websurfing strategies that is inspired by the StumbleUpon recommendation engine. Each day, a websurfer visits a sequence of websites ...
Stratis Ioannidis, Laurent Massoulié
« Prev « First page 3412 / 3591 Last » Next »