Sciweavers

2213 search results - page 397 / 443
» On the Scalability of Centralized Control
Sort
View
PODC
2011
ACM
14 years 4 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
ICCV
2011
IEEE
14 years 1 months ago
HMDB: A Large Video Database for Human Motion Recognition
With nearly one billion online videos viewed everyday, an emerging new frontier in computer vision research is recognition and search in video. While much effort has been devoted ...
Hildegard Kuehne, Hueihan Jhuang, Estibaliz Garrot...
CEAS
2011
Springer
14 years 1 months ago
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems
Web mail providers rely on users to “vote” to quickly and collaboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections o...
Anirudh Ramachandran, Anirban Dasgupta, Nick Feams...
DSN
2011
IEEE
14 years 1 months ago
Coercing clients into facilitating failover for object delivery
Abstract—Application-level protocols used for object delivery, such as HTTP, are built atop TCP/IP and inherit its hostabstraction. Given that these services are replicated for s...
Wyatt Lloyd, Michael J. Freedman
DAC
2012
ACM
13 years 3 months ago
Equivalence checking for behaviorally synthesized pipelines
Loop pipelining is a critical transformation in behavioral synthesis. It is crucial to producing hardware designs with acceptable latency and throughput. However, it is a complex ...
Kecheng Hao, Sandip Ray, Fei Xie