Sciweavers

4511 search results - page 744 / 903
» Observation Based System Security
Sort
View
SEC
2008
15 years 4 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
FORTE
2004
15 years 4 months ago
Generation of Integration Tests for Self-Testing Components
Internet software tightly integrates classic computation with communication software. Heterogeneity and complexity can be tackled with a component-based approach, where components ...
Leonardo Mariani, Mauro Pezzè, David Willmo...
120
Voted
MASCOTS
2001
15 years 4 months ago
A Modular, Analytical Throughput Model for Modern Disk Arrays
Enterprise storage systems depend on disk arrays for their capacity and availability needs. To design and maintain storage systems that efficiently satisfy evolving requirements, ...
Mustafa Uysal, Guillermo A. Alvarez, Arif Merchant
USENIX
2004
15 years 4 months ago
Multihoming Performance Benefits: An Experimental Evaluation of Practical Enterprise Strategies
Multihoming is increasingly being employed by large enterprises and data centers as a mechanism to extract good performance from their provider connections. Today, multihomed end-...
Aditya Akella, Srinivasan Seshan, Anees Shaikh
VCIP
2000
148views Communications» more  VCIP 2000»
15 years 4 months ago
Aircraft recognition and pose estimation
This work presents a geometry based vision system for aircraft recognition and pose estimation using single images. Pose estimation improves the tracking performance of guided wea...
Hatem Hmam, Jijoong Kim