Sciweavers

4511 search results - page 729 / 903
» Observation Based System Security
Sort
View
117
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Incentive provision using intervention
Abstract—Overcoming the inefficiency of non-cooperative outcomes poses an important challenge for network managers in achieving efficient utilization of network resources. This...
Jaeok Park, Mihaela van der Schaar
155
Voted
CVPR
2012
IEEE
13 years 6 months ago
Exploiting local and global patch rarities for saliency detection
We introduce a saliency model based on two key ideas. The first one is considering local and global image patch rarities as two complementary processes. The second one is based o...
Ali Borji, Laurent Itti
CODES
2006
IEEE
15 years 9 months ago
Battery discharge aware energy feasibility analysis
It is observed that pulsed discharge currents allow to drain the battery with a higher specific power. Thus they improve the batteries durability and discharge performance. The q...
Henrik Lipskoch, Karsten Albers, Frank Slomka
ICEIS
2000
IEEE
15 years 8 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant
154
Voted
POPL
1999
ACM
15 years 7 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett