Sciweavers

17951 search results - page 3412 / 3591
» Network Coding Applications
Sort
View
189
Voted
ACSAC
2010
IEEE
15 years 3 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
BMVC
2010
15 years 3 months ago
Toward Robust Action Retrieval in Video
Retrieving human actions from video databases is a paramount but challenging task in computer vision. In this work, we develop such a framework for robustly recognizing human acti...
Samy Bakheet, Ayoub Al-Hamadi, Bernd Michaelis, Us...
FSTTCS
2010
Springer
15 years 3 months ago
Minimizing Busy Time in Multiple Machine Real-time Scheduling
We consider the following fundamental scheduling problem. The input consists of n jobs to be scheduled on a set of machines of bounded capacities. Each job is associated with a re...
Rohit Khandekar, Baruch Schieber, Hadas Shachnai, ...
GLOBECOM
2010
IEEE
15 years 3 months ago
Assessing the Impact of Geographically Correlated Failures on Overlay-Based Data Dissemination
Abstract--This paper addresses reliability of data dissemination applications when there are severe disruptions to the underlying physical infrastructure. Such massive simultaneous...
Kyungbaek Kim, Nalini Venkatasubramanian
152
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Surfing the Blogosphere: Optimal Personalized Strategies for Searching the Web
We propose a distributed mechanism for finding websurfing strategies that is inspired by the StumbleUpon recommendation engine. Each day, a websurfer visits a sequence of websites ...
Stratis Ioannidis, Laurent Massoulié
« Prev « First page 3412 / 3591 Last » Next »