Sciweavers

5451 search results - page 995 / 1091
» Typed Operational Semantics
Sort
View
128
Voted
IACR
2011
86views more  IACR 2011»
14 years 3 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
159
Voted
FPGA
2012
ACM
300views FPGA» more  FPGA 2012»
13 years 11 months ago
Reducing the cost of floating-point mantissa alignment and normalization in FPGAs
In floating-point datapaths synthesized on FPGAs, the shifters that perform mantissa alignment and normalization consume a disproportionate number of LUTs. Shifters are implemente...
Yehdhih Ould Mohammed Moctar, Nithin George, Hadi ...
159
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
Network-aware service placement in a distributed cloud environment
We consider a system of compute and storage resources geographically distributed over a large number of locations connected via a wide-area network. By distributing the resources,...
Moritz Steiner, Bob Gaglianello Gaglianello, Vijay...
SIGMOD
2012
ACM
288views Database» more  SIGMOD 2012»
13 years 5 months ago
Exploiting MapReduce-based similarity joins
Cloud enabled systems have become a crucial component to efficiently process and analyze massive amounts of data. One of the key data processing and analysis operations is the Sim...
Yasin N. Silva, Jason M. Reed
230
Voted
CVPR
2009
IEEE
16 years 10 months ago
Recognizing Realistic Actions from Videos in the Wild
In this paper, we present a systematic framework for re-cognizing realistic actions from videos “in the wild.” Such unconstrained videos are abundant in personal collections as...
Jingen Liu (University of Central Florida), Jiebo ...