Sciweavers

6582 search results - page 1235 / 1317
» The focus of attention problem
Sort
View
117
Voted
RTSS
2006
IEEE
15 years 6 months ago
Tightening the Bounds on Feasible Preemption Points
Caches have become invaluable for higher-end architectures to hide, in part, the increasing gap between processor speed and memory access times. While the effect of caches on timi...
Harini Ramaprasad, Frank Mueller
101
Voted
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 6 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
15 years 6 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
VTC
2006
IEEE
110views Communications» more  VTC 2006»
15 years 6 months ago
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
— WLANs will become a major portion of the fourth generation (4G) cellular system. The seamless handoff problem in WLANs is a very important design issue to support the new astou...
Yuh-Shyan Chen, Chung-Kai Chen, Ming-Chin Chuang
121
Voted
ACCV
2006
Springer
15 years 6 months ago
A Multiscale Co-linearity Statistic Based Approach to Robust Background Modeling
Background subtraction is an essential task in several static camera based computer vision systems. Background modeling is often challenged by spatio-temporal changes occurring due...
Prithwijit Guha, Dibyendu Palai, K. S. Venkatesh, ...
« Prev « First page 1235 / 1317 Last » Next »