Sciweavers

859 search results - page 153 / 172
» The Changing Face of Cryptography
Sort
View
ICIP
2003
IEEE
16 years 1 months ago
Statistical learning for effective visual information retrieval
For effective retrieval of visual information, statistical learning plays a pivotal role. Statistical learning in such a context faces at least two major mathematical challenges: ...
Edward Y. Chang, Beitao Li, Gang Wu, Kingshy Goh
SIGSOFT
2007
ACM
16 years 15 days ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
OSDI
2006
ACM
16 years 2 days ago
CRAMM: Virtual Memory Support for Garbage-Collected Applications
Existing virtual memory systems usually work well with applications written in C and C++, but they do not provide adequate support for garbage-collected applications. The performa...
Ting Yang, Emery D. Berger, Scott F. Kaplan, J. El...
VLDB
2007
ACM
138views Database» more  VLDB 2007»
15 years 12 months ago
CADS: Continuous Authentication on Data Streams
We study processing and authentication of long-running queries on outsourced data streams. In this scenario, a data owner (DO) constantly transmits its data to a service provider ...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
77
Voted
ICSE
2007
IEEE-ACM
15 years 12 months ago
A Future for Software Engineering?
This paper suggests the need for a software engineering research community conversation about the future that the community would like to have. The paper observes that the researc...
Leon J. Osterweil